Lucene search

K
cve[email protected]CVE-2019-19825
HistoryJan 27, 2020 - 5:15 p.m.

CVE-2019-19825

2020-01-2717:15:12
CWE-287
web.nvd.nist.gov
67
cve-2019-19825
totolink
realtek sdk
routers
captcha bypass
security vulnerability

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.008 Low

EPSS

Percentile

81.4%

On certain TOTOLINK Realtek SDK based routers, the CAPTCHA text can be retrieved via an {“topicurl”:“setting/getSanvas”} POST to the boafrm/formLogin URI, leading to a CAPTCHA bypass. (Also, the CAPTCHA text is not needed once the attacker has determined valid credentials. The attacker can perform router actions via HTTP requests with Basic Authentication.) This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0.

Affected configurations

NVD
Node
totolinka3002ru_firmwareRange2.0.0
AND
totolinka3002ruMatch-
Node
totolinka702r_firmwareRange2.1.3
AND
totolinka702rMatch-
Node
totolinkn301rt_firmwareRange2.1.6
AND
totolinkn301rtMatch-
Node
totolinkn302r_firmwareRange3.4.0
AND
totolinkn302rMatch-
Node
totolinkn300rt_firmwareRange3.4.0
AND
totolinkn300rtMatch-
Node
totolinkn200re_firmwareRange4.0.0
AND
totolinkn200reMatch-
Node
totolinkn150rt_firmwareRange3.4.0
AND
totolinkn150rtMatch-
Node
totolinkn100re_firmwareRange3.4.0
AND
totolinkn100reMatch-

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.008 Low

EPSS

Percentile

81.4%