TOTOLINK EX1200T V4.1.2cu.5215 contains an information disclosure vulnerability where an attacker can get the apmib configuration file without authorization, and usernames and passwords can be found in the decoded file.
References
Link | Resource |
---|---|
https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_exportsettings_leak.md | Exploit Third Party Advisory |
https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_exportsettings_leak.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_exportsettings_leak.md - Exploit, Third Party Advisory |
Information
Published : 2022-06-03 12:15
Updated : 2024-11-21 06:28
NVD link : CVE-2021-42886
Mitre link : CVE-2021-42886
CVE.ORG link : CVE-2021-42886
JSON object : View
Products Affected
totolink
- ex1200t_firmware
- ex1200t
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor