First published: Fri Jun 03 2022(Updated: )
In TOTOLINK EX1200T V4.1.2cu.5215, an attacker can obtain sensitive information (wifikey, etc.) without authorization through getSysStatusCfg.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink EX1200T | =4.1.2cu.5215 | |
Totolink EX1200T |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-42893.
The title of the vulnerability is 'In TOTOLINK EX1200T V4.1.2cu.5215 an attacker can obtain sensitive information (wifikey etc.) without authorization through getSysStatusCfg.'
The severity of CVE-2021-42893 is high with a CVSS score of 7.5.
An attacker can exploit CVE-2021-42893 by obtaining sensitive information, such as wifikey, without authorization through the getSysStatusCfg function.
Yes, TOTOLINK EX1200T V4.1.2cu.5215 is affected by CVE-2021-42893.
A fix for CVE-2021-42893 has not been provided yet. It is recommended to update to the latest firmware version or apply any patches or mitigations provided by the vendor when available.
You can find more information about CVE-2021-42893 at the following reference: ['https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_sysstatus_leak.md']
The CWE ID associated with CVE-2021-42893 is CWE-306.