Command Injection Vulnerability in TOTOLINK CA300-PoE Wireless Access Point
CVE-2025-6618
Key Information:
Badges
What is CVE-2025-6618?
A security flaw has been identified in the TOTOLINK CA300-PoE model 6.2c.884 related to the SetWLanApcliSettings function within the wps.so file. This vulnerability allows attackers to manipulate the PIN argument, leading to OS command injection. Given its nature, this vulnerability can be exploited remotely, potentially compromising the device and exposing it to unauthorized access. Users of affected versions are advised to review security practices and apply necessary patches or mitigations as soon as they become available.
Affected Version(s)
CA300-PoE 6.2c.884
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved