Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 27 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Tue, 03 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink
Totolink x6000r |
|
| Vendors & Products |
Totolink
Totolink x6000r |
Fri, 30 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in TOTOLINK X6000R allows OS Command Injection.This issue affects X6000R: through V9.4.0cu.1498_B20250826. | |
| Title | TOTOLINK X6000R Unauthenticated Command Injection Vulnerability | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2026-02-26T15:04:41.771Z
Reserved: 2026-01-30T20:48:17.433Z
Link: CVE-2026-1723
Updated: 2026-01-30T21:20:50.401Z
Status : Deferred
Published: 2026-01-30T21:15:57.853
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-1723
No data.
OpenCVE Enrichment
Updated: 2026-04-18T01:15:05Z