A vulnerability classified as critical was found in TOTOLINK A6000R 1.0.1-B20201211.2000. Affected by this vulnerability is the function apcli_cancel_wps of the file /usr/lib/lua/luci/controller/mtkwifi.lua. The manipulation leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/fjl1113/cve/blob/main/totolink.md | Broken Link Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.303319 | Permissions Required VDB Entry |
| https://vuldb.com/?id.303319 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.543214 | Third Party Advisory VDB Entry |
| https://www.totolink.net/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-04-04 14:15
Updated : 2025-05-28 15:15
NVD link : CVE-2025-3249
Mitre link : CVE-2025-3249
CVE.ORG link : CVE-2025-3249
JSON object : View
Products Affected
totolink
- a6000r
- a6000r_firmware
