First published: Sun Jul 28 2024(Updated: )
A vulnerability has been found in TOTOLINK A3300R 17.0.0cu.557_B20221024 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /etc/shadow.sample. The manipulation leads to use of hard-coded password. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-272569 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Totolink A3300r Firmware | =17.0.0cu.557_b20221024 | |
Totolink A3300r Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7155 is classified as a problematic vulnerability due to the use of hard-coded passwords.
To fix CVE-2024-7155, it is recommended to update the TOTOLINK A3300R firmware to the latest version that addresses the vulnerability.
CVE-2024-7155 affects the Totolink A3300R firmware version 17.0.0cu.557_B20221024.
An attacker could exploit CVE-2024-7155 by utilizing the hard-coded password to gain unauthorized access.
Yes, the CVE-2024-7155 vulnerability is related to the file /etc/shadow.sample.