Command Injection Vulnerability in TOTOLINK A6000R Router
CVE-2025-3249

5.3MEDIUM

Key Information:

Vendor

Totolink

Status
Vendor
CVE Published:
4 April 2025

Badges

๐Ÿ‘พ Exploit Exists

What is CVE-2025-3249?

A command injection vulnerability exists in the TOTOLINK A6000R router, specifically within the 'apcli_cancel_wps' function located in the /usr/lib/lua/luci/controller/mtkwifi.lua file. This flaw can be exploited remotely, allowing an attacker to execute arbitrary commands on the device. The disclosure of this exploit poses significant security risks as it may be utilized by malicious actors. Users are encouraged to apply necessary patches or updates to mitigate potential threats.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

A6000R 1.0.1-B20201211.2000

References

EPSS Score

6% chance of being exploited in the next 30 days.

CVSS V4

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

fjl1113 (VulDB User)
fjl1113 (VulDB User)
.