First published: Sun Aug 28 2022(Updated: )
TOTOLINK A3000RU V4.1.2cu.5185_B20201128 was discovered to contain a hardcoded password for root at /etc/shadow.sample.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A3000ru Firmware | =4.1.2cu.5185_b20201128 | |
TOTOLink A3000RU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36615 is a vulnerability discovered in TOTOLINK A3000RU V4.1.2cu.5185_B20201128 firmware that contains a hardcoded password for root.
CVE-2022-36615 has a severity rating of 7.8, which is considered high.
CVE-2022-36615 affects TOTOLINK A3000RU firmware version 4.1.2cu.5185_B20201128 by including a hardcoded password for root in the /etc/shadow.sample file.
Yes, TOTOLINK A3000RU V4.1.2cu.5185_B20201128 is vulnerable to CVE-2022-36615 due to the hardcoded password for root.
To mitigate the vulnerability in TOTOLINK A3000RU V4.1.2cu.5185_B20201128, it is recommended to update the firmware to a version that does not contain the hardcoded password for root.