5
CVSSv2

CVE-2019-19822

Published: 27/01/2020 Updated: 24/08/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

A certain router administration interface (that includes Realtek APMIB 0.11f for Boa 0.94.14rc21) allows remote malicious users to retrieve the configuration, including sensitive data (usernames and passwords). This affects TOTOLINK A3002RU up to and including 2.0.0, A702R up to and including 2.1.3, N301RT up to and including 2.1.6, N302R up to and including 3.4.0, N300RT up to and including 3.4.0, N200RE up to and including 4.0.0, N150RT up to and including 3.4.0, and N100RE up to and including 3.4.0; Rutek RTK 11N AP through 2019-12-12; Sapido GR297n through 2019-12-12; CIK TELECOM MESH ROUTER through 2019-12-12; KCTVJEJU Wireless AP through 2019-12-12; Fibergate FGN-R2 through 2019-12-12; Hi-Wifi MAX-C300N through 2019-12-12; HCN MAX-C300N through 2019-12-12; T-broad GN-866ac through 2019-12-12; Coship EMTA AP through 2019-12-12; and IO-Data WN-AC1167R through 2019-12-12.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

totolink a3002ru_firmware

totolink a702r_firmware

totolink n302r_firmware

totolink n300rt_firmware

totolink n200re_firmware

totolink n150rt_firmware

totolink n100re_firmware

realtek rtk_11n_ap_firmware

sapido gr297n_firmware

ciktel mesh_router_firmware

kctvjeju wireless_ap_firmware

fg-products fgn-r2_firmware

hiwifi max-c300n_firmware

tbroad gn-866ac_firmware

coship emta_ap_firmwre

iodata wn-ac1167r_firmwre

hcn_max-c300n_project hcn_max-c300n_firmware

totolink n301rt_firmware

Exploits

Realtek SDK based routers suffer from information disclosure, incorrect access control, insecure password storage, code execution, and incorrectly implemented CAPTCHA vulnerabilities ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Multiple vulnerabilities in TOTOLINK and other Realtek SDK based routers <!--X-Subject-Header-End--> <!--X-Head-of-Mes ...

Github Repositories

Totolink N200RE remote root exploit

totoroot Totolink N200RE remote root exploit Disclaimer I know that the code isn't perfect Please don't learn from it or better don't read it at all Supported devices Totolink N200RE-V3 Mini and probably other Totolink devices vulnerable to CVE-2019-19822, CVE-2019-19824 and related How to use curl rawgithubusercontentcom/lkkula/totoroot/main/totoro