First published: Sun Aug 28 2022(Updated: )
TOTOLINK A720R V4.1.5cu.532_B20210610 was discovered to contain a hardcoded password for root at /etc/shadow.sample.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A720r Firmware | =4.1.5cu.532_b20210610 | |
TOTOLINK A720R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36610 is a vulnerability found in TOTOLINK A720R V4.1.5cu.532_B20210610 firmware that contains a hardcoded password for root at /etc/shadow.sample.
The severity of CVE-2022-36610 is high, with a CVSS score of 7.8.
CVE-2022-36610 affects the TOTOLINK A720R firmware version 4.1.5cu.532_B20210610 by exposing a hardcoded password for root at /etc/shadow.sample.
Yes, TOTOLINK A720R V4.1.5cu.532_B20210610 is vulnerable to CVE-2022-36610 due to the presence of a hardcoded password for root.
To fix CVE-2022-36610, users should update their TOTOLINK A720R firmware to a version that does not contain the hardcoded password vulnerability.