Metrics
Affected Vendors & Products
Thu, 26 Jun 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Totolink
Totolink t10 Totolink t10 Firmware |
|
CPEs | cpe:2.3:h:totolink:t10:2.0:*:*:*:*:*:*:* cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207_b20210320:*:*:*:*:*:*:* |
|
Vendors & Products |
Totolink
Totolink t10 Totolink t10 Firmware |
Tue, 17 Jun 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 16 Jun 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability, which was classified as problematic, has been found in TOTOLINK T10 4.1.8cu.5207. Affected by this issue is some unknown functionality of the file /etc/shadow.sample. The manipulation leads to use of hard-coded password. The attack can only be initiated within the local network. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. | |
Title | TOTOLINK T10 shadow.sample hard-coded password | |
Weaknesses | CWE-255 CWE-259 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-06-16T21:00:17.742Z
Updated: 2025-06-17T18:18:54.803Z
Reserved: 2025-06-15T10:52:12.754Z
Link: CVE-2025-6139

Updated: 2025-06-17T18:18:49.384Z

Status : Analyzed
Published: 2025-06-16T21:15:24.513
Modified: 2025-06-26T16:27:37.157
Link: CVE-2025-6139

No data.