CVE-2024-8580

A vulnerability classified as critical was found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220. This vulnerability affects unknown code of the file /etc/shadow.sample. The manipulation leads to use of hard-coded password. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/shadow.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.276814 Permissions Required
https://vuldb.com/?id.276814 Permissions Required Third Party Advisory
https://vuldb.com/?submit.401293 Third Party Advisory VDB Entry
https://www.totolink.net/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*
cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-09-08 21:15

Updated : 2024-09-10 15:47


NVD link : CVE-2024-8580

Mitre link : CVE-2024-8580

CVE.ORG link : CVE-2024-8580


JSON object : View

Products Affected

totolink

  • t8
  • t8_firmware
CWE
CWE-259

Use of Hard-coded Password