OS Command Injection Vulnerability in Totolink N300RH by Totolink
CVE-2026-6158
Key Information:
Badges
What is CVE-2026-6158?
A vulnerability exists in the Totolink N300RH wireless router, specifically within the function setUpgradeUboot in the upgrade.so file. An attacker can manipulate the FileName argument, which leads to os command injection. This issue can be exploited remotely, allowing unauthorized access and the execution of commands on the device. The exploit has been publicly disclosed, highlighting the urgent need for users to secure their devices against potential attacks.
Affected Version(s)
N300RH 6.1c.1353_B20190305
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
