Vulnerabilities (CVE)

Filtered by vendor Totolink Subscribe
Filtered by product N300rh
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-6401 1 Totolink 2 N300rh, N300rh Firmware 2025-06-25 2.3 LOW 3.5 LOW
A vulnerability was found in TOTOLINK N300RH 6.1c.1390_B20191101. It has been classified as problematic. This affects an unknown part of the file /boafrm/formFilter of the component HTTP POST Message Handler. The manipulation of the argument url leads to denial of service. The exploit has been disclosed to the public and may be used.
CVE-2025-6400 1 Totolink 2 N300rh, N300rh Firmware 2025-06-25 9.0 HIGH 8.8 HIGH
A vulnerability was found in TOTOLINK N300RH 6.1c.1390_B20191101 and classified as critical. Affected by this issue is some unknown functionality of the file /boafrm/formPortFw of the component HTTP POST Message Handler. The manipulation of the argument service_type leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-4851 1 Totolink 2 N300rh, N300rh Firmware 2025-05-24 6.5 MEDIUM 6.3 MEDIUM
A vulnerability classified as critical was found in TOTOLINK N300RH 6.1c.1390_B20191101. This vulnerability affects the function setUploadUserData of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument FileName leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-4850 1 Totolink 2 N300rh, N300rh Firmware 2025-05-24 6.5 MEDIUM 6.3 MEDIUM
A vulnerability classified as critical has been found in TOTOLINK N300RH 6.1c.1390_B20191101. This affects the function setUnloadUserData of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument plugin_name leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-4849 1 Totolink 2 N300rh, N300rh Firmware 2025-05-24 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was found in TOTOLINK N300RH 6.1c.1390_B20191101. It has been rated as critical. Affected by this issue is the function CloudACMunualUpdateUserdata of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument url leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.