First published: Tue Feb 20 2024(Updated: )
A vulnerability classified as problematic was found in Totolink X6000R 9.4.0cu.852_B20230719. Affected by this vulnerability is an unknown functionality of the file /etc/shadow. The manipulation leads to hard-coded credentials. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-254179. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink X6000R AX3000 | =9.4.0cu.852_b20230719 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1661 is classified as a problematic vulnerability due to the presence of hard-coded credentials.
To remediate CVE-2024-1661, update the Totolink X6000R firmware to a version that addresses the hard-coded credentials issue.
CVE-2024-1661 affects the Totolink X6000R firmware version 9.4.0cu.852_B20230719.
The exploitation of CVE-2024-1661 can potentially allow attackers to gain unauthorized access through hard-coded credentials.
Yes, the attack for CVE-2024-1661 must be conducted on the local host.