๐Ÿ” CVE Alert

CVE-2026-6158

HIGH 7.3

Totolink N300RH upgrade.so setUpgradeUboot os command injection

CVSS Score
7.3
EPSS Score
3.0%
EPSS Percentile
86th

A flaw has been found in Totolink N300RH 6.1c.1353_B20190305. Affected is the function setUpgradeUboot of the file upgrade.so. This manipulation of the argument FileName causes os command injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.

CWE CWE-78 CWE-77
Vendor totolink
Product n300rh
Published Apr 13, 2026
Last Updated Apr 16, 2026
Stay Ahead of the Next One

Get instant alerts for totolink n300rh

Be the first to know when new high vulnerabilities affecting totolink n300rh are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Totolink / N300RH
6.1c.1353_B20190305

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/357038 vuldb.com: https://vuldb.com/vuln/357038/cti vuldb.com: https://vuldb.com/submit/796426 github.com: https://github.com/xyh4ck/iot_poc/tree/main/TOTOLINK/N300RHv4/02_setUpgradeUboot_RCE totolink.net: https://www.totolink.net/

Credits

๐Ÿ” xuanyu (VulDB User)