First published: Wed May 18 2022(Updated: )
TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 were discovered to contain a hard coded password for the telnet service stored in the component /web_cste/cgi-bin/product.ini.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A3100r Firmware | =4.1.2cu.5050_b20200504 | |
Totolink A3100r Firmware | =4.1.2cu.5247_b20211129 | |
TOTOLink A3100R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29644 is a vulnerability discovered in TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 firmware versions, which contain a hard coded password for the telnet service stored in the component /web_cste/cgi-bin/product.ini.
The severity of CVE-2022-29644 is critical with a CVSS score of 9.8.
If your TOTOLINK A3100R firmware version is either V4.1.2cu.5050_B20200504 or V4.1.2cu.5247_B20211129, then it is affected by CVE-2022-29644.
To fix CVE-2022-29644, it is recommended to update your TOTOLINK A3100R firmware to a version that does not contain the hard coded password vulnerability.
You can find more information about CVE-2022-29644 at the following reference link: https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/7.md