CVE-2022-48113

A vulnerability in TOTOLINK N200RE_v5 firmware V9.3.5u.6139 allows unauthenticated attackers to access the telnet service via a crafted POST request. Attackers are also able to leverage this vulnerability to login as root via hardcoded credentials.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:n200re-v5_firmware:9.3.5u.6139:*:*:*:*:*:*:*
cpe:2.3:h:totolink:n200re-v5:-:*:*:*:*:*:*:*

History

10 Feb 2023, 12:38

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-798
CPE cpe:2.3:h:totolink:n200re-v5:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:n200re-v5_firmware:9.3.5u.6139:*:*:*:*:*:*:*
First Time Totolink n200re-v5
Totolink
Totolink n200re-v5 Firmware
References (MISC) https://wefir.blogspot.com/2022/12/totolink-n200rev5-telnet-backdoor.html - (MISC) https://wefir.blogspot.com/2022/12/totolink-n200rev5-telnet-backdoor.html - Exploit, Third Party Advisory

02 Feb 2023, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-02-02 22:15

Updated : 2023-12-10 14:48


NVD link : CVE-2022-48113

Mitre link : CVE-2022-48113

CVE.ORG link : CVE-2022-48113


JSON object : View

Products Affected

totolink

  • n200re-v5_firmware
  • n200re-v5
CWE
CWE-798

Use of Hard-coded Credentials