{ "id": "CVE-2024-28338", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-12T17:15:59.047", "lastModified": "2024-03-12T17:46:17.273", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A login bypass in TOTOLINK A8000RU V7.1cu.643_B20200521 allows attackers to login to Administrator accounts via providing a crafted session cookie." }, { "lang": "es", "value": "Una omisi\u00f3n de inicio de sesi\u00f3n en TOTOLINK A8000RU V7.1cu.643_B20200521 permite a los atacantes iniciar sesi\u00f3n en cuentas de administrador proporcionando una cookie de sesi\u00f3n manipulada." } ], "metrics": {}, "references": [ { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A8000RU/TOTOlink%20A8000RU%20login%20bypass.md", "source": "cve@mitre.org" } ] }