Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2024-7332Use of Hard-coded Password in Cp450

Severity
9.3CRITICALNVD
EPSS
92.1%
top 0.29%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedAug 1
Latest updateSep 27

Description

A vulnerability was found in TOTOLINK CP450 4.1.0cu.747_B20191224. It has been classified as critical. This affects an unknown part of the file /web_cste/cgi-bin/product.ini of the component Telnet Service. The manipulation leads to use of hard-coded password. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273255. NOTE: The vendor was contacted early about this disclosure but did

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5totolink/cp4504.1.0cu.747_B20191224
NVDtotolink/cp450_firmware4.1.0cu.747_b20191224

🔴Vulnerability Details

2
CVEList
TOTOLINK CP450 Telnet Service product.ini hard-coded password2024-08-01
GHSA
GHSA-2pxp-hm79-mvqx: A vulnerability was found in TOTOLINK CP450 42024-08-01

💥Exploits & PoCs

1
Nuclei
TOTOLINK CP450 v4.1.0cu.747_B20191224 - Hard-Coded Password Vulnerability

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Totolink CP450 Information Disclosure via product.ini (CVE-2024-7332)2024-09-27
CVE-2024-7332 — Use of Hard-coded Password in Cp450 | cvebase