Hard Coded Password Vulnerability in TOTOLINK Router
CVE-2022-37841
7.5HIGH
Summary
The TOTOLINK A860R router, specifically version V4.1.2cu.5182_B20201027, contains a serious security issue where a hard coded password for the root user is stored in the /etc/shadow.sample file. This vulnerability allows unauthorized access to the router, significantly compromising the security of the device and the network it supports. Malicious actors can exploit this weakness to gain control over the device, potentially leading to further attacks on connected systems.
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved