3.9
CVE-2025-6139
- EPSS 0.06%
- Published 16.06.2025 21:00:17
- Last modified 26.06.2025 16:27:37
- Source cna@vuldb.com
- Teams watchlist Login
- Open Login
A vulnerability, which was classified as problematic, has been found in TOTOLINK T10 4.1.8cu.5207. Affected by this issue is some unknown functionality of the file /etc/shadow.sample. The manipulation leads to use of hard-coded password. The attack can only be initiated within the local network. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Data is provided by the National Vulnerability Database (NVD)
Totolink ≫ T10 Firmware Version4.1.8cu.5207_b20210320
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.06% | 0.189 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
cna@vuldb.com | 3.9 | 0.5 | 3.4 |
CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L
|
cna@vuldb.com | 2 | 0 | 0 |
CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
cna@vuldb.com | 3.7 | 2 | 6.4 |
AV:A/AC:H/Au:M/C:P/I:P/A:P
|
CWE-259 Use of Hard-coded Password
The product contains a hard-coded password, which it uses for its own inbound authentication or for outbound communication to external components.