ID

VAR-202505-1840


CVE

CVE-2025-4851


TITLE

TOTOLINK  of  N300RH  Injection Vulnerability in Firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-005681

DESCRIPTION

A vulnerability classified as critical was found in TOTOLINK N300RH 6.1c.1390_B20191101. This vulnerability affects the function setUploadUserData of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument FileName leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of N300RH The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK N300RH is a long-distance wireless router from China's TOTOLINK Electronics. TOTOLINK N300RH has a command injection vulnerability, which is caused by the parameter FileName in the file /cgi-bin/cstecgi.cgi failing to properly filter special characters and commands in the constructed command. No detailed vulnerability details are currently provided

Trust: 2.16

sources: NVD: CVE-2025-4851 // JVNDB: JVNDB-2025-005681 // CNVD: CNVD-2025-10917

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-10917

AFFECTED PRODUCTS

vendor:totolinkmodel:n300rhscope:eqversion:6.1c.1390_b20191101

Trust: 1.0

vendor:totolinkmodel:n300rhscope:eqversion:n300rh firmware 6.1c.1390 b20191101

Trust: 0.8

vendor:totolinkmodel:n300rhscope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:n300rhscope: - version: -

Trust: 0.8

vendor:totolinkmodel:n300rh 6.1c.1390 b20191101scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-10917 // JVNDB: JVNDB-2025-005681 // NVD: CVE-2025-4851

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-4851
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2025-4851
value: CRITICAL

Trust: 1.0

OTHER: JVNDB-2025-005681
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2025-10917
value: MEDIUM

Trust: 0.6

cna@vuldb.com: CVE-2025-4851
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-005681
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-10917
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-4851
baseSeverity: MEDIUM
baseScore: 6.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 2.8
impactScore: 3.4
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2025-4851
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2025-005681
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-10917 // JVNDB: JVNDB-2025-005681 // NVD: CVE-2025-4851 // NVD: CVE-2025-4851

PROBLEMTYPE DATA

problemtype:CWE-74

Trust: 1.0

problemtype:CWE-77

Trust: 1.0

problemtype:injection (CWE-74) [ others ]

Trust: 0.8

problemtype: Command injection (CWE-77) [NVD evaluation ]

Trust: 0.8

problemtype: Command injection (CWE-77) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-005681 // NVD: CVE-2025-4851

EXTERNAL IDS

db:NVDid:CVE-2025-4851

Trust: 3.2

db:VULDBid:309322

Trust: 1.8

db:JVNDBid:JVNDB-2025-005681

Trust: 0.8

db:CNVDid:CNVD-2025-10917

Trust: 0.6

sources: CNVD: CNVD-2025-10917 // JVNDB: JVNDB-2025-005681 // NVD: CVE-2025-4851

REFERENCES

url:https://vuldb.com/?id.309322

Trust: 1.8

url:https://vuldb.com/?submit.575074

Trust: 1.8

url:https://www.totolink.net/

Trust: 1.8

url:https://github.com/ch13hh/tmp_store_cc/blob/main/tt/ta/m3.md

Trust: 1.6

url:https://vuldb.com/?ctiid.309322

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-4851

Trust: 0.8

sources: CNVD: CNVD-2025-10917 // JVNDB: JVNDB-2025-005681 // NVD: CVE-2025-4851

SOURCES

db:CNVDid:CNVD-2025-10917
db:JVNDBid:JVNDB-2025-005681
db:NVDid:CVE-2025-4851

LAST UPDATE DATE

2025-05-29T19:32:18.154000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-10917date:2025-05-28T00:00:00
db:JVNDBid:JVNDB-2025-005681date:2025-05-26T08:46:00
db:NVDid:CVE-2025-4851date:2025-05-24T01:03:29.400

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-10917date:2025-05-28T00:00:00
db:JVNDBid:JVNDB-2025-005681date:2025-05-26T00:00:00
db:NVDid:CVE-2025-4851date:2025-05-18T04:15:23.360