In TOTOLINK A3002RU 1.0.8, the router provides a page that allows the user to change their account name and password. This page, password.htm, contains JavaScript which is used to confirm the user knows their current password before allowing them to change their password. However, this JavaScript contains the current user’s password in plaintext.
References
Link | Resource |
---|---|
https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 | Exploit Third Party Advisory |
https://www.ise.io/casestudies/sohopelessly-broken-2-0/ | Third Party Advisory |
https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 | Exploit Third Party Advisory |
https://www.ise.io/casestudies/sohopelessly-broken-2-0/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 - Exploit, Third Party Advisory | |
References | () https://www.ise.io/casestudies/sohopelessly-broken-2-0/ - Third Party Advisory |
Information
Published : 2020-02-24 19:15
Updated : 2024-11-21 03:46
NVD link : CVE-2018-13313
Mitre link : CVE-2018-13313
CVE.ORG link : CVE-2018-13313
JSON object : View
Products Affected
totolink
- a3002ru_firmware
- a3002ru
CWE
CWE-922
Insecure Storage of Sensitive Information