First published: Sun Aug 28 2022(Updated: )
TOTOLINK A810R V4.1.2cu.5182_B20201026 and V5.9c.4050_B20190424 was discovered to contain a hardcoded password for root at /etc/shadow.sample.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A810R firmware | =4.1.2cu.5182_b20201026 | |
TOTOLINK A810R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36616 is a vulnerability found in TOTOLINK A810R V4.1.2cu.5182_B20201026 and V5.9c.4050_B20190424 routers, which contains a hardcoded password for root at /etc/shadow.sample.
The severity of CVE-2022-36616 is high with a severity score of 7.8 (out of 10).
CVE-2022-36616 affects TOTOLINK A810R routers by featuring a hardcoded password for root at /etc/shadow.sample.
To fix CVE-2022-36616 in TOTOLINK A810R routers, you should update your router's firmware to a version that does not include the vulnerability.
You can find more information about CVE-2022-36616 on the GitHub page [here](https://github.com/whiter6666/CVE/blob/main/TOTOLINK_A810R/hard_code.md).