Vulnerability Description
In TOTOLINK A3002RU 1.0.8, the router provides a page that allows the user to change their account name and password. This page, password.htm, contains JavaScript which is used to confirm the user knows their current password before allowing them to change their password. However, this JavaScript contains the current user’s password in plaintext.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Totolink | A3002Ru Firmware | 1.0.8 |
| Totolink | A3002Ru | - |
Related Weaknesses (CWE)
References
- https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f4ExploitThird Party Advisory
- https://www.ise.io/casestudies/sohopelessly-broken-2-0/Third Party Advisory
- https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f4ExploitThird Party Advisory
- https://www.ise.io/casestudies/sohopelessly-broken-2-0/Third Party Advisory
FAQ
What is CVE-2018-13313?
CVE-2018-13313 is a vulnerability with a CVSS score of 6.5 (MEDIUM). In TOTOLINK A3002RU 1.0.8, the router provides a page that allows the user to change their account name and password. This page, password.htm, contains JavaScript which is used to confirm the user kno...
How severe is CVE-2018-13313?
CVE-2018-13313 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-13313?
Check the references section above for vendor advisories and patch information. Affected products include: Totolink A3002Ru Firmware, Totolink A3002Ru.