First published: Fri Feb 03 2023(Updated: )
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a hard code password for the telnet service which is stored in the component /etc/config/product.ini.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink Ca300-poe Firmware | =6.2c.884 | |
TOTOLINK CA300-PoE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-24147 is high with a CVSS score of 7.5.
CVE-2023-24147 impacts TOTOLINK CA300-PoE V6.2c.884 by exposing a hard code password for the telnet service, which can be exploited by attackers.
The hard code password for the telnet service in TOTOLINK CA300-PoE V6.2c.884 is stored in the component /etc/config/product.ini.
No, TOTOLINK CA300-PoE V6.2c.884 is not the only affected software. Other versions or models may also be vulnerable.
To fix CVE-2023-24147 in TOTOLINK CA300-PoE V6.2c.884, it is recommended to update the firmware to a patched version provided by the vendor.