First published: Sun Aug 28 2022(Updated: )
TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a hardcoded password for root at /etc/shadow.sample.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink N600r Firmware | =4.3.0cu.7647_b20210106 | |
TOTOLINK N600R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36613 refers to a vulnerability found in TOTOLINK N600R V4.3.0cu.7647_B20210106 firmware, which contains a hardcoded password for the root account.
CVE-2022-36613 has a severity rating of 7.8 (high).
CVE-2022-36613 affects TOTOLINK N600R V4.3.0cu.7647_B20210106 firmware by exposing a hardcoded password for the root account, which can be a security risk.
Yes, TOTOLINK N600R V4.3.0cu.7647_B20210106 firmware is vulnerable to CVE-2022-36613 due to the presence of a hardcoded password for the root account.
To fix CVE-2022-36613, it is recommended to update the TOTOLINK N600R firmware to a version that does not contain the hardcoded password for the root account.