Vulnerability Description
Prolink router PRS1841 was discovered to contain hardcoded credentials for its Telnet and FTP services.
CVSS Score
9.8
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Prolink2U | Prs1841 Firmware | u_v2 |
| Prolink2U | Prs1841 | - |
Related Weaknesses (CWE)
References
- https://0xsp.com/security%20research%20%20development%20srd/backdoor-discovered-ExploitThird Party Advisory
- https://packetstormsecurity.com/files/170342/ProLink-PRS1841-Backdoor-Account.htThird Party AdvisoryVDB Entry
- https://prolink2u.com/product/prs1841/ProductVendor Advisory
- https://0xsp.com/security%20research%20%20development%20srd/backdoor-discovered-ExploitThird Party Advisory
- https://packetstormsecurity.com/files/170342/ProLink-PRS1841-Backdoor-Account.htThird Party AdvisoryVDB Entry
- https://prolink2u.com/product/prs1841/ProductVendor Advisory
FAQ
What is CVE-2022-46637?
CVE-2022-46637 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Prolink router PRS1841 was discovered to contain hardcoded credentials for its Telnet and FTP services.
How severe is CVE-2022-46637?
CVE-2022-46637 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-46637?
Check the references section above for vendor advisories and patch information. Affected products include: Prolink2U Prs1841 Firmware, Prolink2U Prs1841.