Vulnerability Description
A vulnerability in TOTOLINK N200RE_v5 firmware V9.3.5u.6139 allows unauthenticated attackers to access the telnet service via a crafted POST request. Attackers are also able to leverage this vulnerability to login as root via hardcoded credentials.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Totolink | N200Re-V5 Firmware | 9.3.5u.6139 |
| Totolink | N200Re-V5 | - |
Related Weaknesses (CWE)
References
- https://wefir.blogspot.com/2022/12/totolink-n200rev5-telnet-backdoor.htmlExploitThird Party Advisory
- https://wefir.blogspot.com/2022/12/totolink-n200rev5-telnet-backdoor.htmlExploitThird Party Advisory
FAQ
What is CVE-2022-48113?
CVE-2022-48113 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A vulnerability in TOTOLINK N200RE_v5 firmware V9.3.5u.6139 allows unauthenticated attackers to access the telnet service via a crafted POST request. Attackers are also able to leverage this vulnerabi...
How severe is CVE-2022-48113?
CVE-2022-48113 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-48113?
Check the references section above for vendor advisories and patch information. Affected products include: Totolink N200Re-V5 Firmware, Totolink N200Re-V5.