A login bypass in TOTOLINK A8000RU V7.1cu.643_B20200521 allows attackers to login to Administrator accounts via providing a crafted session cookie.
References
Link | Resource |
---|---|
https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A8000RU/TOTOlink%20A8000RU%20login%20bypass.md | Exploit Third Party Advisory |
https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A8000RU/TOTOlink%20A8000RU%20login%20bypass.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
03 Apr 2025, 13:16
Type | Values Removed | Values Added |
---|---|---|
First Time |
Totolink a8000ru
Totolink Totolink a8000ru Firmware |
|
CPE | cpe:2.3:o:totolink:a8000ru_firmware:7.1cu.643_b20200521:*:*:*:*:*:*:* cpe:2.3:h:totolink:a8000ru:-:*:*:*:*:*:*:* |
|
References | () https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A8000RU/TOTOlink%20A8000RU%20login%20bypass.md - Exploit, Third Party Advisory |
Information
Published : 2024-03-12 17:15
Updated : 2025-04-03 13:16
NVD link : CVE-2024-28338
Mitre link : CVE-2024-28338
CVE.ORG link : CVE-2024-28338
JSON object : View
Products Affected
totolink
- a8000ru
- a8000ru_firmware
CWE
CWE-284
Improper Access Control