CVE-2024-8580Use of Hard-coded Password in Ac1200 T8

Severity
9.2CRITICALNVD
EPSS
0.2%
top 63.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 8

Description

A vulnerability classified as critical was found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220. This vulnerability affects unknown code of the file /etc/shadow.sample. The manipulation leads to use of hard-coded password. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS vector

CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5totolink/ac1200_t84.1.5cu.861_B20230220
NVDtotolink/t8_firmware4.1.5cu.861_b20230220

🔴Vulnerability Details

2
GHSA
GHSA-q5wp-qj6q-q9jm: A vulnerability classified as critical was found in TOTOLINK AC1200 T8 42024-09-08
CVEList
TOTOLINK AC1200 T8 shadow.sample hard-coded password2024-09-08
CVE-2024-8580 — Use of Hard-coded Password in Ac1200 T8 | cvebase