A vulnerability classified as critical was found in TOTOLINK A6000R 1.0.1-B20201211.2000. Affected by this vulnerability is the function apcli_cancel_wps of the file /usr/lib/lua/luci/controller/mtkwifi.lua. The manipulation leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/fjl1113/cve/blob/main/totolink.md | Broken Link Exploit Third Party Advisory | 
| https://vuldb.com/?ctiid.303319 | Permissions Required VDB Entry | 
| https://vuldb.com/?id.303319 | Third Party Advisory VDB Entry | 
| https://vuldb.com/?submit.543214 | Third Party Advisory VDB Entry | 
| https://www.totolink.net/ | Product | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    28 May 2025, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Totolink a6000r Firmware Totolink Totolink a6000r | |
| References | () https://github.com/fjl1113/cve/blob/main/totolink.md - Broken Link, Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.303319 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.303319 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.543214 - Third Party Advisory, VDB Entry | |
| References | () https://www.totolink.net/ - Product | |
| CPE | cpe:2.3:h:totolink:a6000r:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:a6000r_firmware:1.0.1-b20201211.2000:*:*:*:*:*:*:* | 
07 Apr 2025, 14:18
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
04 Apr 2025, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-04-04 14:15
Updated : 2025-05-28 15:15
NVD link : CVE-2025-3249
Mitre link : CVE-2025-3249
CVE.ORG link : CVE-2025-3249
JSON object : View
Products Affected
                totolink
- a6000r_firmware
- a6000r
