{"uuid": "3a056c41-bf4a-4257-8e75-1514b95d663b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-48113", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8939", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-48113\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A vulnerability in TOTOLINK N200RE_v5 firmware V9.3.5u.6139 allows unauthenticated attackers to access the telnet service via a crafted POST request. Attackers are also able to leverage this vulnerability to login as root via hardcoded credentials.\n\ud83d\udccf Published: 2023-02-02T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-26T19:15:13.916Z\n\ud83d\udd17 References:\n1. https://wefir.blogspot.com/2022/12/totolink-n200rev5-telnet-backdoor.html", "creation_timestamp": "2025-03-26T19:26:13.000000Z"}