CVE-2023-24147

TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a hard code password for the telnet service which is stored in the component /etc/config/product.ini.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:ca300-poe_firmware:6.2c.884:*:*:*:*:*:*:*
cpe:2.3:h:totolink:ca300-poe:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:47

Type Values Removed Values Added
References () https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/telnet_hard_code/telnet_hard_code.md - Exploit, Third Party Advisory () https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/telnet_hard_code/telnet_hard_code.md - Exploit, Third Party Advisory
Summary
  • (es) Se descubrió que TOTOLINK CA300-PoE V6.2c.884 contiene una contraseña de código fijo para el servicio telnet que se almacena en el componente /etc/config/product.ini.

Information

Published : 2023-02-03 16:15

Updated : 2024-11-21 07:47


NVD link : CVE-2023-24147

Mitre link : CVE-2023-24147

CVE.ORG link : CVE-2023-24147


JSON object : View

Products Affected

totolink

  • ca300-poe_firmware
  • ca300-poe
CWE
CWE-798

Use of Hard-coded Credentials