First published: Wed Aug 10 2022(Updated: )
TOTOLINK A3002RU V3.0.0-B20220304.1804 has a hardcoded password for root in /etc/shadow.sample.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A3002ru Firmware | =3.0.0-b20220304.1804 | |
TOTOLINK A3002RU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-35491 is critical with a CVSS score of 9.8.
Yes, TOTOLINK A3002RU V3.0.0-B20220304.1804 is affected by CVE-2022-35491.
CVE-2022-35491 is a vulnerability in TOTOLINK A3002RU V3.0.0-B20220304.1804 where a hardcoded password for root is found in /etc/shadow.sample.
To fix CVE-2022-35491, it is recommended to update to a patched version of TOTOLINK A3002RU firmware.
You can find more information about CVE-2022-35491 at the following reference link: [GitHub](https://github.com/1337536723/iot/blob/main/totolink/A3002RU.md)