Vendor Of The Product: Totolink A830R
Affected Products and Firmware version: Totolink A830R with firmware version V4.1.2cu.5182
Vulnerability: Sensitive Information Disclosure
Vulnerability description: The totolink router A830R (firmware version V4.1.2cu.5182) device program code will leak the root user password.
Find the latest firmware of A830R from totolink website and download the latest firmware to conduct code audit locally. Download address:[TOTOLINK全球领先的无线路由器,无线中继器研发制造厂商](<http://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=11&ids=36>)
Use binwalk to analyze firmware:
After analyzing the unpacked files in the binwalk, it is found that the router is a lighttpd service and there is an etc/shadow.sample file:
The content of the shadow.sample file is:
root:$1$BJXeRIOB$w1dFteNXpGDcSSWBMGsl2/:16090:0:99999:7:::
nobody:*:0:0:99999:7:::
The root password obtained by online cracking is cs2012, and the online cracking website is https://www.cmd5.com/