First published: Tue Jul 30 2024(Updated: )
A vulnerability was found in TOTOLINK LR1200 9.3.1cu.2832. It has been classified as problematic. This affects an unknown part of the file /etc/shadow.sample. The manipulation leads to use of hard-coded password. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272787. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Totolink Lr1200gb Firmware | =9.3.1cu.2832 | |
Totolink Lr1200 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7216 has been classified as a problematic vulnerability with a high complexity of exploitation.
CVE-2024-7216 affects the TOTOLINK LR1200 by allowing the use of a hard-coded password through manipulation of the /etc/shadow.sample file.
To mitigate CVE-2024-7216, ensure that the firmware for the TOTOLINK LR1200 is updated to the latest version that addresses this vulnerability.
While the exploitability of CVE-2024-7216 is reported to be high, successful exploitation may require advanced skills.
CVE-2024-7216 specifically affects TOTOLINK LR1200 firmware version 9.3.1cu.2832.