Vulnerability Description
A vulnerability classified as critical was found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220. This vulnerability affects unknown code of the file /etc/shadow.sample. The manipulation leads to use of hard-coded password. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Totolink | T8 Firmware | 4.1.5cu.861_b20230220 |
| Totolink | T8 | - |
Related Weaknesses (CWE)
References
- https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/shadowExploitThird Party Advisory
- https://vuldb.com/?ctiid.276814Permissions Required
- https://vuldb.com/?id.276814Permissions RequiredThird Party Advisory
- https://vuldb.com/?submit.401293Third Party AdvisoryVDB Entry
- https://www.totolink.net/Product
FAQ
What is CVE-2024-8580?
CVE-2024-8580 is a vulnerability with a CVSS score of 8.1 (HIGH). A vulnerability classified as critical was found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220. This vulnerability affects unknown code of the file /etc/shadow.sample. The manipulation leads to use of h...
How severe is CVE-2024-8580?
CVE-2024-8580 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-8580?
Check the references section above for vendor advisories and patch information. Affected products include: Totolink T8 Firmware, Totolink T8.