Submit #377473: TOTOLINK A3700R V9.1.2u.5822_B20200513 Authentication Bypass Issuesinfo

TitleTOTOLINK A3700R V9.1.2u.5822_B20200513 Authentication Bypass Issues
DescriptionIn TOTOLINK A3700R V9.1.2u.5822_B20200513, an attacker can obtain the apmib configuration file without authorization through /cgi-bin/ExportSettings.sh. When making a request to /cgi-bin/ExportSettings.sh, the attacker can obtain the apmib configuration file Config--xxxxxxxx.dat without authorization. The username and password can be found in the decoded file.
Source⚠️ https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3700R/ExportSettings.md
User
 yhryhryhr_tu (UID 66750)
Submission07/19/2024 15:48 (2 years ago)
Moderation07/27/2024 19:27 (8 days later)
StatusAccepted
VulDB entry272570 [TOTOLINK A3700R 9.1.2u.5822_B20200513 apmib Configuration ExportSettings.sh information disclosure]
Points19

Do you know our Splunk app?

Download it now for free!