TOTOLINK CP300 V2.0.4-B20201102 was discovered to contain a hardcoded password vulnerability in /etc/shadow.sample, which allows attackers to log in as root.
                
            Metrics
Affected Vendors & Products
References
        History
                    Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
Fri, 30 May 2025 21:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Totolink Totolink cp300 Totolink cp300 Firmware | |
| CPEs | cpe:2.3:h:totolink:cp300:2.0:*:*:*:*:*:*:* cpe:2.3:o:totolink:cp300_firmware:2.0.4-b20201102:*:*:*:*:*:*:* | |
| Vendors & Products | Totolink Totolink cp300 Totolink cp300 Firmware | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: mitre
Published: 2024-06-03T20:09:40.333Z
Updated: 2025-02-13T15:59:38.336Z
Reserved: 2024-05-30T00:00:00.000Z
Link: CVE-2024-36782
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-02T03:43:49.143Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-06-03T21:15:08.453
Modified: 2025-05-30T16:50:13.077
Link: CVE-2024-36782
 Redhat
                        Redhat
                    No data.