A vulnerability, which was classified as problematic, has been found in TOTOLINK T10 4.1.8cu.5207. Affected by this issue is some unknown functionality of the file /etc/shadow.sample. The manipulation leads to use of hard-coded password. The attack can only be initiated within the local network. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
History

Thu, 26 Jun 2025 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink
Totolink t10
Totolink t10 Firmware
CPEs cpe:2.3:h:totolink:t10:2.0:*:*:*:*:*:*:*
cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207_b20210320:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink t10
Totolink t10 Firmware

Tue, 17 Jun 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Jun 2025 21:15:00 +0000

Type Values Removed Values Added
Description A vulnerability, which was classified as problematic, has been found in TOTOLINK T10 4.1.8cu.5207. Affected by this issue is some unknown functionality of the file /etc/shadow.sample. The manipulation leads to use of hard-coded password. The attack can only be initiated within the local network. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
Title TOTOLINK T10 shadow.sample hard-coded password
Weaknesses CWE-255
CWE-259
References
Metrics cvssV2_0

{'score': 3.7, 'vector': 'AV:A/AC:H/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.9, 'vector': 'CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.9, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 2, 'vector': 'CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-06-16T21:00:17.742Z

Updated: 2025-06-17T18:18:54.803Z

Reserved: 2025-06-15T10:52:12.754Z

Link: CVE-2025-6139

cve-icon Vulnrichment

Updated: 2025-06-17T18:18:49.384Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-16T21:15:24.513

Modified: 2025-06-26T16:27:37.157

Link: CVE-2025-6139

cve-icon Redhat

No data.