Command Injection Vulnerability in TOTOLINK A6000R Router
CVE-2025-3249
Key Information:
Badges
Summary
A command injection vulnerability exists in the TOTOLINK A6000R router, specifically within the 'apcli_cancel_wps' function located in the /usr/lib/lua/luci/controller/mtkwifi.lua file. This flaw can be exploited remotely, allowing an attacker to execute arbitrary commands on the device. The disclosure of this exploit poses significant security risks as it may be utilized by malicious actors. Users are encouraged to apply necessary patches or updates to mitigate potential threats.
Affected Version(s)
A6000R 1.0.1-B20201211.2000
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved