First published: Thu Aug 04 2022(Updated: )
Totolink A3600R_Firmware V4.1.2cu.5182_B20201102 contains a hard code password for root in /etc/shadow.sample.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A3600r Firmware | =4.1.2cu.5182_b20201102 | |
TOTOLink A3600R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34993 has a high severity rating due to the hard-coded root password in the firmware.
To fix CVE-2022-34993, update the Totolink A3600R Firmware to a version that does not include the hard-coded password.
CVE-2022-34993 affects the Totolink A3600R with firmware version 4.1.2cu.5182_B20201102.
The risks include unauthorized access and control over the Totolink A3600R router due to the hard-coded password.
Yes, a patch that removes the hard-coded password has been made available by the vendor for the affected firmware version.