7.5
CVSSv3

CVE-2019-19823

Published: 27/01/2020 Updated: 06/02/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

A certain router administration interface (that includes Realtek APMIB 0.11f for Boa 0.94.14rc21) stores cleartext administrative passwords in flash memory and in a file. This affects TOTOLINK A3002RU up to and including 2.0.0, A702R up to and including 2.1.3, N301RT up to and including 2.1.6, N302R up to and including 3.4.0, N300RT up to and including 3.4.0, N200RE up to and including 4.0.0, N150RT up to and including 3.4.0, and N100RE up to and including 3.4.0; Rutek RTK 11N AP through 2019-12-12; Sapido GR297n through 2019-12-12; CIK TELECOM MESH ROUTER through 2019-12-12; KCTVJEJU Wireless AP through 2019-12-12; Fibergate FGN-R2 through 2019-12-12; Hi-Wifi MAX-C300N through 2019-12-12; HCN MAX-C300N through 2019-12-12; T-broad GN-866ac through 2019-12-12; Coship EMTA AP through 2019-12-12; and IO-Data WN-AC1167R through 2019-12-12.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

totolink a3002ru_firmware

totolink a702r_firmware

totolink n302r_firmware

totolink n300rt_firmware

totolink n200re_firmware

totolink n150rt_firmware

totolink n100re_firmware

realtek rtk_11n_ap_firmware

sapido gr297n_firmware

ciktel mesh_router_firmware

kctvjeju wireless_ap_firmware

fg-products fgn-r2_firmware

hiwifi max-c300n_firmware

tbroad gn-866ac_firmware

coship emta_ap_firmwre

iodata wn-ac1167r_firmwre

hcn_max-c300n_project hcn_max-c300n_firmware

totolink n301rt_firmware

Exploits

Realtek SDK based routers suffer from information disclosure, incorrect access control, insecure password storage, code execution, and incorrectly implemented CAPTCHA vulnerabilities ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Multiple vulnerabilities in TOTOLINK and other Realtek SDK based routers <!--X-Subject-Header-End--> <!--X-Head-of-Mes ...