Cyber Posture

CVE-2026-6158

High

Published: 13 April 2026

Published
13 April 2026
Modified
27 April 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0486 89.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-6158 is a high-severity Command Injection (CWE-77) vulnerability in Totolink N300RH (inferred from references). Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 10.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Validates the FileName argument passed to setUpgradeUboot in upgrade.so to prevent OS command injection payloads.

prevent

Remediates the command injection flaw by installing vendor firmware patches or updates for the Totolink N300RH.

prevent

Enforces access controls requiring authentication for the vulnerable upgrade endpoint, blocking unauthenticated remote exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

OS command injection in public-facing router web interface directly enables T1190 for remote exploitation and T1059.004 for Unix shell command execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A flaw has been found in Totolink N300RH 6.1c.1353_B20190305. Affected is the function setUpgradeUboot of the file upgrade.so. This manipulation of the argument FileName causes os command injection. The attack is possible to be carried out remotely. The exploit has…

more

been published and may be used.

Deeper analysisAI

CVE-2026-6158 is an OS command injection vulnerability in the Totolink N300RH router running firmware version 6.1c.1353_B20190305. The flaw resides in the setUpgradeUboot function within the upgrade.so file, where manipulation of the FileName argument enables arbitrary command execution. Associated with CWE-77 and CWE-78, it carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L), indicating high severity due to its remote exploitability.

The vulnerability can be exploited remotely by unauthenticated attackers over the network with low complexity and no user interaction required. Successful exploitation allows limited impacts including low-level confidentiality, integrity, and availability violations, such as executing arbitrary OS commands on the device.

References include a public proof-of-concept exploit on GitHub demonstrating remote code execution (RCE) via the vulnerable endpoint, along with VulDB entries detailing the issue. The Totolink vendor website is listed, though specific patch or mitigation guidance is not detailed in available sources. Security practitioners should isolate affected devices and monitor for exploitation attempts given the published exploit.

Details

CWE(s)

Affected Products

Totolink
N300RH
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-2175Shared CWE-77, CWE-78
CVE-2026-2210Shared CWE-77, CWE-78
CVE-2026-2260Shared CWE-77, CWE-78
CVE-2026-2081Shared CWE-77, CWE-78
CVE-2025-15472Shared CWE-77, CWE-78
CVE-2026-2157Shared CWE-77, CWE-78
CVE-2025-1829Shared CWE-77, CWE-78
CVE-2026-5690Shared CWE-77, CWE-78
CVE-2026-6116Shared CWE-77, CWE-78
CVE-2026-5995Shared CWE-77, CWE-78

References