First published: Tue Apr 25 2017(Updated: )
vsftpd on TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n has a backdoor admin account with the 1234 password, a backdoor guest account with the guest password, and a backdoor test account with the test password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link C2 Firmware | <=0.9.1_4.2_v0032.0_build_160706 | |
TP-Link C2 Firmware | ||
TP-Link C20i Firmware | <=0.9.1_4.2_v0032.0_build_160706 | |
TP-Link Archer C20i |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8218 is considered a high severity vulnerability due to the existence of multiple backdoor accounts in the affected firmware.
To fix CVE-2017-8218, update your TP-Link C2 or C20i device firmware to a version that does not contain the backdoor accounts.
CVE-2017-8218 affects TP-Link C2 and C20i devices running firmware version 0.9.1_4.2_v0032.0_build_160706.
Yes, CVE-2017-8218 involves default passwords for backdoor accounts: '1234' for admin, 'guest' for guest, and 'test' for test accounts.
CVE-2017-8218 poses serious security risks, allowing unauthorized access to the device and possible exploitation of the network.