TOTOLINK A810R V4.1.2cu.5182_B20201026 was discovered to contain a hardcoded password for the telnet service in product.ini.
References
Link | Resource |
---|---|
https://locrian-lightning-dc7.notion.site/Hard-code-Password-19f8e5e2b1a2803f864afbbc4262152e?pvs=73 | Exploit Third Party Advisory |
Configurations
History
29 Apr 2025, 16:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://locrian-lightning-dc7.notion.site/Hard-code-Password-19f8e5e2b1a2803f864afbbc4262152e?pvs=73 - Exploit, Third Party Advisory | |
First Time |
Totolink
Totolink a810r Firmware |
|
CPE | cpe:2.3:o:totolink:a810r_firmware:4.1.2cu.5182_b20201026:*:*:*:*:*:*:* |
23 Apr 2025, 14:08
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
22 Apr 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CWE | CWE-259 |
22 Apr 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-22 16:15
Updated : 2025-04-29 16:21
NVD link : CVE-2025-28031
Mitre link : CVE-2025-28031
CVE.ORG link : CVE-2025-28031
JSON object : View
Products Affected
totolink
- a810r_firmware
CWE
CWE-259
Use of Hard-coded Password