In TOTOLINK A3002RU 1.0.8, the router provides a page that allows the user to change their account name and password. This page, password.htm, contains JavaScript which is used to confirm the user knows their current password before allowing them to change their password. However, this JavaScript contains the current user’s password in plaintext.
References
Link | Resource |
---|---|
https://www.ise.io/casestudies/sohopelessly-broken-2-0/ | Third Party Advisory |
https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2020-02-24 11:15
Updated : 2020-03-04 14:06
NVD link : CVE-2018-13313
Mitre link : CVE-2018-13313
JSON object : View
CWE
CWE-922
Insecure Storage of Sensitive Information
Products Affected
totolink
- a3002ru
- a3002ru_firmware