On certain TOTOLINK Realtek SDK based routers, the CAPTCHA text can be retrieved via an {"topicurl":"setting/getSanvas"} POST to the boafrm/formLogin URI, leading to a CAPTCHA bypass. (Also, the CAPTCHA text is not needed once the attacker has determined valid credentials. The attacker can perform router actions via HTTP requests with Basic Authentication.) This affects A3002RU up to and including 2.0.0, A702R up to and including 2.1.3, N301RT up to and including 2.1.6, N302R up to and including 3.4.0, N300RT up to and including 3.4.0, N200RE up to and including 4.0.0, N150RT up to and including 3.4.0, and N100RE up to and including 3.4.0.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
totolink a3002ru_firmware |
||
totolink a702r_firmware |
||
totolink n301rt_firmware |
||
totolink n302r_firmware |
||
totolink n300rt_firmware |
||
totolink n200re_firmware |
||
totolink n150rt_firmware |
||
totolink n100re_firmware |