TOTOLINK A3600R Vulnerability: Hard-coded Password Exposed
CVE-2024-7159
Key Information:
Badges
Summary
A significant vulnerability has been identified in the TOTOLINK A3600R model, specifically in the Telnet Service component. This issue arises from the use of a hard-coded password within the file located at /web_cste/cgi-bin/product.ini. The existence of this hard-coded credential poses a severe security risk, as it allows unauthorized access to the device. Public disclosure of the exploit has raised concerns, particularly given that the vendor has not provided a response to the initial notification regarding this vulnerability. Organizations using affected versions are advised to assess their risk and consider mitigation strategies to safeguard their networks.
Affected Version(s)
A3600R 4.1.2cu.5182_B20201102
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved