First published: Fri Sep 16 2022(Updated: )
In TOTOLINK T6 V4.1.5cu.709_B20210518, there is a hard coded password for root in /etc/shadow.sample.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink T6 Firmware | =4.1.5cu.709_b20210518 | |
TOTOLink T6 | =3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-38823 is classified as a high-severity vulnerability due to the presence of a hard-coded password.
To fix CVE-2022-38823, you should update the TOTOLINK T6 firmware to a version that removes the hard-coded password.
The implications of CVE-2022-38823 include the potential for unauthorized access to the device using the hard-coded root password.
CVE-2022-38823 affects the TOTOLINK T6 firmware version 4.1.5cu.709_B20210518.
No, the hardware itself is not vulnerable; the vulnerability is specific to the firmware version.