No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 13 Apr 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in Totolink N300RH 6.1c.1353_B20190305. Affected is the function setUpgradeUboot of the file upgrade.so. This manipulation of the argument FileName causes os command injection. The attack is possible to be carried out remotely. The exploit has been published and may be used. | |
| Title | Totolink N300RH upgrade.so setUpgradeUboot os command injection | |
| First Time appeared |
Totolink
Totolink n300rh Firmware |
|
| Weaknesses | CWE-77 CWE-78 |
|
| CPEs | cpe:2.3:o:totolink:n300rh_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Totolink
Totolink n300rh Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-13T04:00:19.297Z
Reserved: 2026-04-12T18:06:33.592Z
Link: CVE-2026-6158
No data.
Status : Received
Published: 2026-04-13T05:16:05.003
Modified: 2026-04-13T05:16:05.003
Link: CVE-2026-6158
No data.
OpenCVE Enrichment
No data.