{"api_version":"1","generated_at":"2026-04-23T17:15:10+00:00","cve":"CVE-2018-13313","urls":{"html":"https://cve.report/CVE-2018-13313","api":"https://cve.report/api/cve/CVE-2018-13313.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-13313","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-13313"},"summary":{"title":"CVE-2018-13313","description":"In TOTOLINK A3002RU 1.0.8, the router provides a page that allows the user to change their account name and password. This page, password.htm, contains JavaScript which is used to confirm the user knows their current password before allowing them to change their password. However, this JavaScript contains the current user’s password in plaintext.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2020-02-24 19:15:00","updated_at":"2020-03-04 22:06:00"},"problem_types":["CWE-922"],"metrics":[],"references":[{"url":"https://www.ise.io/casestudies/sohopelessly-broken-2-0/","name":"https://www.ise.io/casestudies/sohopelessly-broken-2-0/","refsource":"MISC","tags":["Third Party Advisory"],"title":"SOHOpelessly Broken 2.0 - Independent Security Evaluators","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154","name":"https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"New Vulnerabilities in TOTOLINK A3002RU – Independent Security Evaluators","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-13313","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-13313","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"13313","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"totolink","cpe5":"a3002ru","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"13313","vulnerable":"0","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"totolink","cpe5":"a3002ru","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"13313","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"totolink","cpe5":"a3002ru_firmware","cpe6":"1.0.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"13313","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"totolink","cpe5":"a3002ru_firmware","cpe6":"1.0.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2018-13313","ASSIGNER":"cve@mitre.org","TITLE":"Admin Password returned in password.htm","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154","refsource":"MISC","name":"https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154"},{"url":"https://www.ise.io/casestudies/sohopelessly-broken-2-0/","refsource":"MISC","name":"https://www.ise.io/casestudies/sohopelessly-broken-2-0/"}]},"description":{"description_data":[{"lang":"eng","value":"In TOTOLINK A3002RU 1.0.8, the router provides a page that allows the user to change their account name and password. This page, password.htm, contains JavaScript which is used to confirm the user knows their current password before allowing them to change their password. However, this JavaScript contains the current user’s password in plaintext."}]}},"nvd":{"publishedDate":"2020-02-24 19:15:00","lastModifiedDate":"2020-03-04 22:06:00","problem_types":["CWE-922"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:totolink:a3002ru_firmware:1.0.8:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:totolink:a3002ru:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"13313","Ordinal":"129962","Title":"CVE-2018-13313","CVE":"CVE-2018-13313","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"13313","Ordinal":"1","NoteData":"In TOTOLINK A3002RU 1.0.8, the router provides a page that allows the user to change their account name and password. This page, password.htm, contains JavaScript which is used to confirm the user knows their current password before allowing them to change their password. However, this JavaScript contains the current user’s password in plaintext.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"13313","Ordinal":"2","NoteData":"2020-02-24","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"13313","Ordinal":"3","NoteData":"2020-02-24","Type":"Other","Title":"Modified"}]}}}