Vulnerability Description
TOTOLINK CP900L v4.1.5cu.798_B20221228 was discovered to contain a hardcoded password for telnet in /web_cste/cgi-bin/product.ini, which allows attackers to log in as root.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Totolink | Cp900L Firmware | 4.1.5cu.798_b20221228 |
| Totolink | Cp900L | - |
Related Weaknesses (CWE)
References
- http://totolink.comProduct
- https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK%20CP900L/READBroken Link
- http://totolink.comProduct
- https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK%20CP900L/READBroken Link
FAQ
What is CVE-2024-35396?
CVE-2024-35396 is a vulnerability with a CVSS score of 9.8 (CRITICAL). TOTOLINK CP900L v4.1.5cu.798_B20221228 was discovered to contain a hardcoded password for telnet in /web_cste/cgi-bin/product.ini, which allows attackers to log in as root.
How severe is CVE-2024-35396?
CVE-2024-35396 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-35396?
Check the references section above for vendor advisories and patch information. Affected products include: Totolink Cp900L Firmware, Totolink Cp900L.