Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2024-7332
HistoryAug 01, 2024 - 5:45 p.m.

TOTOLINK CP450 v4.1.0cu.747_B20191224 - Hard-Coded Password Vulnerability

2024-08-0117:45:35
ProjectDiscovery
github.com
6
totolink
cp450
hard-coded password
vulnerability
telnet service
critical
remote exploitation

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS4

9.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

AI Score

6.8

Confidence

High

EPSS

0.076

Percentile

94.2%

A critical vulnerability has been discovered in TOTOLINK CP450 version 4.1.0cu.747_B20191224. This vulnerability affects an unknown part of the file /web_cste/cgi-bin/product.ini of the Telnet Service component. The issue stems from the use of a hard-coded password, which can be exploited remotely without any user interaction.
id: CVE-2024-7332

info:
  name: TOTOLINK CP450 v4.1.0cu.747_B20191224 - Hard-Coded Password Vulnerability
  author: securityforeveryone
  severity: critical
  description: |
    A critical vulnerability has been discovered in TOTOLINK CP450 version 4.1.0cu.747_B20191224. This vulnerability affects an unknown part of the file /web_cste/cgi-bin/product.ini of the Telnet Service component. The issue stems from the use of a hard-coded password, which can be exploited remotely without any user interaction.
  reference:
    - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/CP450/product.md
    - https://nvd.nist.gov/vuln/detail/CVE-2024-7332
    - https://cvefeed.io/vuln/detail/CVE-2024-7332
    - https://www.tenable.com/cve/CVE-2024-7332
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2024-7332
    cwe-id: CWE-259
    epss-score: 0.00045
    epss-percentile: 0.16226
    cpe: cpe:2.3:a:totolink:cp450:4.1.0cu.747_b20191224:*:*:*:*:*:*:*
  metadata:
    max-request: 2
    vendor: totolink
    product: cp450_firmware
    fofa-query: title="totolink"
  tags: cve,cve2024,totolink

http:
  - method: GET
    path:
      - "{{BaseURL}}/web_cste/cgi-bin/product.ini"

    matchers:
      - type: dsl
        dsl:
          - 'contains_all(body,"[PRODUCT]","[WLAN]","HostName")'
          - 'status_code == 200'
        condition: and
# digest: 4a0a004730450221008a58f22e43d23ea6427fdf45bf165f8d51ec5d7885d9674a26a208b6fae0071e022030e29dfd508b4e2a2dc1cec8dc92a091e6641e7616b0bac749612cc72b679c6f:922c64590222798bb761d5b6d8e72950

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS4

9.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

AI Score

6.8

Confidence

High

EPSS

0.076

Percentile

94.2%

Related for NUCLEI:CVE-2024-7332