CWE
259
CVE Published
Advisory Published
Updated

CVE-2024-31810

First published: Tue May 14 2024(Updated: )

TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a hardcoded password for root at /etc/shadow.sample.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Totolink EX200

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-31810?

    CVE-2024-31810 is considered a high severity vulnerability due to the presence of a hardcoded password for the root user.

  • How do I fix CVE-2024-31810?

    To mitigate CVE-2024-31810, update the firmware of the TOTOLINK EX200 device to the latest version that removes the hardcoded password.

  • What impact does CVE-2024-31810 have on my device?

    CVE-2024-31810 allows unauthorized access to the root account, potentially compromising the security and functionality of the TOTOLINK EX200 device.

  • Is CVE-2024-31810 exploitative?

    Yes, CVE-2024-31810 can be exploited by attackers to gain control over affected TOTOLINK EX200 devices.

  • Are all versions of TOTOLINK EX200 affected by CVE-2024-31810?

    The vulnerability CVE-2024-31810 affects TOTOLINK EX200 versions V4.0.3c.7646_B20201211 and potentially earlier versions.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203