First published: Sun Sep 08 2024(Updated: )
A vulnerability classified as critical was found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220. This vulnerability affects unknown code of the file /etc/shadow.sample. The manipulation leads to use of hard-coded password. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Totolink T8 Firmware | =4.1.5cu.861_b20230220 | |
TOTOLINK T8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8580 is classified as a critical vulnerability due to its potential for remote exploitation and the use of hard-coded passwords.
To mitigate CVE-2024-8580, update the TOTOLINK AC1200 T8 firmware to a version that addresses this vulnerability.
CVE-2024-8580 affects the /etc/shadow.sample file in the TOTOLINK AC1200 T8 firmware.
Yes, CVE-2024-8580 can be exploited remotely, allowing attackers to manipulate the hard-coded password.
The vulnerable version of TOTOLINK AC1200 T8 firmware is 4.1.5cu.861_B20230220.