{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-6158","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-04-12T18:06:33.592Z","datePublished":"2026-04-13T04:00:19.297Z","dateUpdated":"2026-04-16T13:36:44.745Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-04-13T04:00:19.297Z"},"title":"Totolink N300RH upgrade.so setUpgradeUboot os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"OS Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]}],"affected":[{"vendor":"Totolink","product":"N300RH","versions":[{"version":"6.1c.1353_B20190305","status":"affected"}],"cpes":["cpe:2.3:o:totolink:n300rh_firmware:*:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"A flaw has been found in Totolink N300RH 6.1c.1353_B20190305. Affected is the function setUpgradeUboot of the file upgrade.so. This manipulation of the argument FileName causes os command injection. The attack is possible to be carried out remotely. The exploit has been published and may be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-04-12T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-04-12T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-04-12T20:11:39.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"xuanyu (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/vuln/357038","name":"VDB-357038 | Totolink N300RH upgrade.so setUpgradeUboot os command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/357038/cti","name":"VDB-357038 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/796426","name":"Submit #796426 | TOTOLINK N300RH_V4 V6.1c.1353_B20190305 OS Command Injection","tags":["third-party-advisory"]},{"url":"https://github.com/xyh4ck/iot_poc/tree/main/TOTOLINK/N300RHv4/02_setUpgradeUboot_RCE","tags":["exploit","patch"]},{"url":"https://www.totolink.net/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2026-6158","role":"CISA Coordinator","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2026-04-16T13:17:04.446018Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-16T13:36:44.745Z"}}]}}