ID

VAR-202208-2388


TITLE

Hardcoded vulnerability in TOTOLINK A720R

Trust: 0.6

sources: CNVD: CNVD-2022-56033

DESCRIPTION

TOTOLINK A720R is a wireless router. TOTOLINK A720R has a hard-coded vulnerability that can be exploited by attackers to obtain sensitive information.

Trust: 0.6

sources: CNVD: CNVD-2022-56033

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-56033

AFFECTED PRODUCTS

vendor:totolinkmodel:a720r 4.1.5cu.532 b20210610scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2022-56033

CVSS

SEVERITY

CVSSV2

CVSSV3

CNVD: CNVD-2022-56033
value: LOW

Trust: 0.6

CNVD: CNVD-2022-56033
severity: LOW
baseScore: 2.1
vectorString: AV:N/AC:H/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2022-56033

PATCH

title:Patch for Hardcoded vulnerability in TOTOLINK A720Rurl:https://www.cnvd.org.cn/patchinfo/show/343511

Trust: 0.6

sources: CNVD: CNVD-2022-56033

EXTERNAL IDS

db:CNVDid:CNVD-2022-56033

Trust: 0.6

sources: CNVD: CNVD-2022-56033

SOURCES

db:CNVDid:CNVD-2022-56033

LAST UPDATE DATE

2023-09-28T23:11:20.335000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2022-56033date:2022-08-10T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2022-56033date:2022-08-29T00:00:00