A vulnerability was found in TOTOLINK A3000RU 5.9c.5185. It has been rated as problematic. This issue affects some unknown processing of the file /web_cste/cgi-bin/product.ini. The manipulation leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272591. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
The product contains a hard-coded password, which it uses for its own inbound authentication or for outbound communication to external components.
The product contains hard-coded credentials, such as a password or cryptographic key.
Link | Tags |
---|---|
https://vuldb.com/?id.272591 | third party advisory vdb entry |
https://vuldb.com/?ctiid.272591 | signature third party advisory permissions required |
https://vuldb.com/?submit.377957 | third party advisory |
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3000RU/product.md | exploit |