changed 3 years ago
Published Linked with GitHub

CVE-2021-46008

by KVS

  • Description
    The hard-code telnet password can be discovered from official released firmware. An attacker, who has connected to the Wi-Fi, can easily telnet into the target with root shell if the telnet function is turned on.

  • Affected version
    Totolink A3100R V5.9c.4577

  • Root Cause Analysis
    There are two ways can leak the password from the firmware.

    1. Find the file "squashfs/web_cste/cgi-bin/product.ini", and the telnet password is represented in plaintext.
    2. Find the file "squashfs/etc/shadow.sample", there is a user root with a md5 hashed password. Using John the Ripper with rockyou.txt can easily crack the hashed password.
  • Proof-of-Concept

Method 1

Image Not Showing Possible Reasons
  • The image file may be corrupted
  • The server hosting the image is unavailable
  • The image path is incorrect
  • The image format is not supported
Learn More →

Method 2

Image Not Showing Possible Reasons
  • The image file may be corrupted
  • The server hosting the image is unavailable
  • The image path is incorrect
  • The image format is not supported
Learn More →

Image Not Showing Possible Reasons
  • The image file may be corrupted
  • The server hosting the image is unavailable
  • The image path is incorrect
  • The image format is not supported
Learn More →

Select a repo