Sensitive Information Disclosure Description

Vendor Of The Product: Totolink A830R

Affected Products and Firmware version: Totolink A830R with firmware version V4.1.2cu.5182

Vulnerability: Sensitive Information Disclosure

Vulnerability description: The totolink router A830R (firmware version V4.1.2cu.5182) device program code will leak the root user password.

Vulnerability Analysis

Find the latest firmware of A830R from totolink website and download the latest firmware to conduct code audit locally. Download address:[TOTOLINK全球领先的无线路由器,无线中继器研发制造厂商](<http://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=11&ids=36>)

Use binwalk to analyze firmware:

Untitled

After analyzing the unpacked files in the binwalk, it is found that the router is a lighttpd service and there is an etc/shadow.sample file:

Untitled

The content of the shadow.sample file is:

Untitled

root:$1$BJXeRIOB$w1dFteNXpGDcSSWBMGsl2/:16090:0:99999:7:::
nobody:*:0:0:99999:7:::

The root password obtained by online cracking is cs2012, and the online cracking website is https://www.cmd5.com/

Untitled