- Description
- A vulnerability, which was classified as problematic, has been found in TOTOLINK T10 4.1.8cu.5207. Affected by this issue is some unknown functionality of the file /etc/shadow.sample. The manipulation leads to use of hard-coded password. The attack can only be initiated within the local network. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
- Source
- cna@vuldb.com
- NVD status
- Analyzed
CVSS 4.0
- Type
- Secondary
- Base score
- 2
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- LOW
CVSS 3.1
- Type
- Primary
- Base score
- 3.9
- Impact score
- 3.4
- Exploitability score
- 0.5
- Vector string
- CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L
- Severity
- LOW
CVSS 2.0
- Type
- Secondary
- Base score
- 3.7
- Impact score
- 6.4
- Exploitability score
- 2
- Vector string
- AV:A/AC:H/Au:M/C:P/I:P/A:P
- cna@vuldb.com
- CWE-255
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207_b20210320:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "827828BD-015A-458C-8E00-37B2BF489F2D"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:totolink:t10:2.0:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "D751C3BC-20DC-4896-B334-EE3A00F600BF"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]