A security flaw has been discovered in TOTOLINK X2000R up to 2.0.0. The affected element is an unknown function of the file /etc/shadow.sample of the component Administrative Interface. The manipulation results in use of default credentials. Attacking locally is a requirement. Attacks of this nature are highly complex. The exploitability is described as difficult. The exploit has been released to the public and may be exploited.
The product uses default credentials (such as passwords or cryptographic keys) for potentially critical functionality.
Link | Tags |
---|---|
https://vuldb.com/?id.321691 | vdb entry |
https://vuldb.com/?ctiid.321691 | signature permissions required |
https://vuldb.com/?submit.636069 | third party advisory |
https://github.com/XXRicardo/iot-cve/blob/main/TOLOLINK/X2000R-Gh-V2.0.0.md | related |
https://github.com/XXRicardo/iot-cve/blob/main/TOLOLINK/X2000R-Gh-V2.0.0.md#steps-to-reproduce | exploit |
https://www.totolink.net/ | product |