First published: Fri May 24 2024(Updated: )
TOTOLINK CP900L v4.1.5cu.798_B20221228 was discovered to contain a hardcoded password vulnerability in /etc/shadow.sample, which allows attackers to log in as root.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink CP900L Firmware | ||
All of | ||
Totolink CP900L Firmware | =4.1.5cu.798_b20221228 | |
Totolink CP900L Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-35395 is considered a high severity vulnerability due to the presence of a hardcoded password that allows unauthorized root access.
To mitigate CVE-2024-35395, update the firmware of your TOTOLINK CP900L device to a version that does not contain the hardcoded password.
CVE-2024-35395 affects TOTOLINK CP900L firmware version 4.1.5cu.798_B20221228.
CVE-2024-35395 is classified as a hardcoded password vulnerability, which poses risks of unauthorized access.
Yes, once attackers gain root access through CVE-2024-35395, they can potentially launch further attacks or compromise the entire network.