An issue in TOTOLINK Wi-Fi 6 Router Series Device X2000R-Gh-V2.0.0 allows a remote attacker to execute arbitrary code via the default password
References
Link | Resource |
---|---|
https://github.com/XXRicardo/iot-cve/blob/main/TOLOLINK/X2000R-Gh-V2.0.0.md | Exploit Third Party Advisory |
https://www.totolink.net/home/menu/detail/menu_listtpl/download/id/259/ids/36.html | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
02 Oct 2025, 20:04
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:totolink:x2000r_firmware:2.0.0-b20230727.1043.web:*:*:*:*:*:*:* cpe:2.3:h:totolink:x2000r:v2:*:*:*:*:*:*:* |
|
First Time |
Totolink x2000r
Totolink Totolink x2000r Firmware |
|
References | () https://github.com/XXRicardo/iot-cve/blob/main/TOLOLINK/X2000R-Gh-V2.0.0.md - Exploit, Third Party Advisory | |
References | () https://www.totolink.net/home/menu/detail/menu_listtpl/download/id/259/ids/36.html - Product |
12 Sep 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-12 16:15
Updated : 2025-10-02 20:04
NVD link : CVE-2025-57579
Mitre link : CVE-2025-57579
CVE.ORG link : CVE-2025-57579
JSON object : View
Products Affected
totolink
- x2000r_firmware
- x2000r
CWE
CWE-798
Use of Hard-coded Credentials