CVE-2018-13313

In TOTOLINK A3002RU 1.0.8, the router provides a page that allows the user to change their account name and password. This page, password.htm, contains JavaScript which is used to confirm the user knows their current password before allowing them to change their password. However, this JavaScript contains the current user’s password in plaintext.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:a3002ru_firmware:1.0.8:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a3002ru:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:46

Type Values Removed Values Added
References () https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 - Exploit, Third Party Advisory () https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 - Exploit, Third Party Advisory
References () https://www.ise.io/casestudies/sohopelessly-broken-2-0/ - Third Party Advisory () https://www.ise.io/casestudies/sohopelessly-broken-2-0/ - Third Party Advisory

Information

Published : 2020-02-24 19:15

Updated : 2024-11-21 03:46


NVD link : CVE-2018-13313

Mitre link : CVE-2018-13313

CVE.ORG link : CVE-2018-13313


JSON object : View

Products Affected

totolink

  • a3002ru_firmware
  • a3002ru
CWE
CWE-922

Insecure Storage of Sensitive Information