cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-46025,https://securityvulnerability.io/vulnerability/CVE-2022-46025,Incorrect Access Control in Totolink Product,"The Totolink N200RE_V5, specifically version V9.3.5u.6255_B20211224, is exposed to an Incorrect Access Control vulnerability. This flaw enables remote attackers to exploit the system, granting unauthorized access to sensitive Wi-Fi system information, including the Wi-Fi SSID and password. Such vulnerabilities pose significant risks, allowing malicious entities to infiltrate networks and potentially compromise user data and privacy. It is crucial for users and network administrators to implement security measures to protect against these unauthorized access risks.",Totolink,N200re V5 Firmware,9.1,CRITICAL,0.0012700000079348683,false,,false,false,false,,,false,false,,2024-01-10T00:00:00.000Z,0 CVE-2022-48113,https://securityvulnerability.io/vulnerability/CVE-2022-48113,Remote Access Vulnerability in TOTOLINK N200RE_v5 Firmware,"A vulnerability in the TOTOLINK N200RE_v5 firmware allows unauthenticated attackers to exploit the telnet service through a specially crafted POST request. This flaw enables attackers to gain unauthorized access and potentially log in as the root user, utilizing hardcoded credentials. The implications of this vulnerability may lead to critical unauthorized control over network devices.",Totolink,N200re-v5 Firmware,9.8,CRITICAL,0.02607000060379505,false,,false,false,false,,,false,false,,2023-02-02T00:00:00.000Z,0