Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-36211 | TOTOLINK CP300 V2.0.4-B20201102 was discovered to contain a hardcoded password vulnerability in /etc/shadow.sample, which allows attackers to log in as root. |
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 30 May 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink
Totolink cp300 Totolink cp300 Firmware |
|
| CPEs | cpe:2.3:h:totolink:cp300:2.0:*:*:*:*:*:*:* cpe:2.3:o:totolink:cp300_firmware:2.0.4-b20201102:*:*:*:*:*:*:* |
|
| Vendors & Products |
Totolink
Totolink cp300 Totolink cp300 Firmware |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T15:59:38.336Z
Reserved: 2024-05-30T00:00:00.000Z
Link: CVE-2024-36782
Updated: 2024-08-02T03:43:49.143Z
Status : Analyzed
Published: 2024-06-03T21:15:08.453
Modified: 2025-05-30T16:50:13.077
Link: CVE-2024-36782
No data.
OpenCVE Enrichment
No data.
EUVD