| Title | TOTOLINK A3700R V9.1.2u.5822_B20200513 Authentication Bypass Issues |
|---|
| Description | In TOTOLINK A3700R V9.1.2u.5822_B20200513, an attacker can obtain the apmib configuration file without authorization through /cgi-bin/ExportSettings.sh. When making a request to /cgi-bin/ExportSettings.sh, the attacker can obtain the apmib configuration file Config--xxxxxxxx.dat without authorization. The username and password can be found in the decoded file. |
|---|
| Source | ⚠️ https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3700R/ExportSettings.md |
|---|
| User | yhryhryhr_tu (UID 66750) |
|---|
| Submission | 07/19/2024 15:48 (2 years ago) |
|---|
| Moderation | 07/27/2024 19:27 (8 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 272570 [TOTOLINK A3700R 9.1.2u.5822_B20200513 apmib Configuration ExportSettings.sh information disclosure] |
|---|
| Points | 19 |
|---|