Submit #377942: TOTOLINK A3600R V4.1.2cu.5182_B20201102 Use of Hard-coded Passwordinfo

TitleTOTOLINK A3600R V4.1.2cu.5182_B20201102 Use of Hard-coded Password
DescriptionThere is a hard code password for telnet in /web_cste/cgi-bin/product.ini of A3600R V4.1.2cu.5182_B20201102
Source⚠️ https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/product.md
User
 wxhwxhwxh_mie (UID 66748)
Submission07/20/2024 15:15 (2 years ago)
Moderation07/27/2024 19:27 (7 days later)
StatusAccepted
VulDB entry272573 [TOTOLINK A3600R 4.1.2cu.5182_B20201102 Telnet Service product.ini hard-coded password]
Points15

Want to know what is going to be exploited?

We predict KEV entries!