Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-3249


A vulnerability classified as critical was found in TOTOLINK A6000R 1.0.1-B20201211.2000. Affected by this vulnerability is the function apcli_cancel_wps of the file /usr/lib/lua/luci/controller/mtkwifi.lua. The manipulation leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.


Published

2025-04-04T14:15:25.453

Last Modified

2025-05-28T15:15:07.290

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 6.3 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-74
    CWE-77

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System totolink a6000r_firmware 1.0.1-b20201211.2000 Yes
Hardware totolink a6000r - No

References