cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-36612,https://securityvulnerability.io/vulnerability/CVE-2022-36612,Hardcoded Password Vulnerability in TOTOLINK A950RG Router,"The TOTOLINK A950RG router version V4.1.2cu.5204_B20210112 is affected by a vulnerability due to a hardcoded password for the root user located in /etc/shadow.sample. This flaw can potentially allow unauthorized access to the system, compromising the integrity and security of the device. Users are advised to check the affected version and take necessary steps to mitigate the risk associated with this vulnerability.",Totolink,A950rg Firmware,7.8,HIGH,0.0011399999493733048,false,,false,false,false,,,false,false,,2022-08-29T00:15:00.000Z,0 CVE-2022-25082,https://securityvulnerability.io/vulnerability/CVE-2022-25082,Command Injection Vulnerability in TOTOLink A950RG Routers,"The TOTOLink A950RG routers contain a command injection vulnerability in the 'Main' function, allowing attackers to execute arbitrary commands through a manipulated QUERY_STRING parameter. This security flaw poses a significant risk, enabling adversaries to potentially gain unauthorized access and control over the affected devices. It is crucial for users of the vulnerable firmware versions to apply the recommended patches or mitigations to secure their networks.",Totolink,A950rg Firmware,9.8,CRITICAL,0.948930025100708,false,,false,false,false,,,false,false,,2022-02-24T15:15:00.000Z,0