Lucene search

K
nvd[email protected]NVD:CVE-2019-19823
HistoryJan 27, 2020 - 6:15 p.m.

CVE-2019-19823

2020-01-2718:15:12
CWE-522
web.nvd.nist.gov

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.007 Low

EPSS

Percentile

81.0%

A certain router administration interface (that includes Realtek APMIB 0.11f for Boa 0.94.14rc21) stores cleartext administrative passwords in flash memory and in a file. This affects TOTOLINK A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0; Rutek RTK 11N AP through 2019-12-12; Sapido GR297n through 2019-12-12; CIK TELECOM MESH ROUTER through 2019-12-12; KCTVJEJU Wireless AP through 2019-12-12; Fibergate FGN-R2 through 2019-12-12; Hi-Wifi MAX-C300N through 2019-12-12; HCN MAX-C300N through 2019-12-12; T-broad GN-866ac through 2019-12-12; Coship EMTA AP through 2019-12-12; and IO-Data WN-AC1167R through 2019-12-12.

Affected configurations

NVD
Node
totolinka3002ru_firmwareRange2.0.0
AND
totolinka3002ruMatch-
Node
totolinka702r_firmwareRange2.1.3
AND
totolinka702rMatch-
Node
totolinkn302r_firmwareRange3.4.0
AND
totolinkn302rMatch-
Node
totolinkn300rt_firmwareRange3.4.0
AND
totolinkn300rtMatch-
Node
totolinkn200re_firmwareRange4.0.0
AND
totolinkn200reMatch-
Node
totolinkn150rt_firmwareRange3.4.0
AND
totolinkn150rtMatch-
Node
totolinkn100re_firmwareRange3.4.0
AND
totolinkn100reMatch-
Node
realtekrtk_11n_ap_firmwareRange2019-12-12
AND
realtekrtk_11n_apMatch-
Node
sapidogr297n_firmwareRange2019-12-12
AND
sapidogr297nMatch-
Node
ciktelmesh_router_firmwareRange2019-12-12
AND
ciktelmesh_routerMatch-
Node
kctvjejuwireless_ap_firmwareRange2019-12-12
AND
kctvjejuwireless_apMatch-
Node
fg-productsfgn-r2_firmwareRange2019-12-12
AND
fg-productsfgn-r2Match-
Node
hiwifimax-c300n_firmwareRange2019-12-12
AND
hiwifimax-c300nMatch-
Node
tbroadgn-866ac_firmwareRange2019-12-12
AND
tbroadgn-866acMatch-
Node
coshipemta_ap_firmwreRange2019-12-12
AND
coshipemta_apMatch-
Node
iodatawn-ac1167r_firmwreRange2019-12-12
AND
iodatawn-ac1167rMatch-
Node
hcn_max-c300n_projecthcn_max-c300n_firmwareRange2019-12-12
AND
hcn_max-c300n_projecthcn_max-c300nMatch-
Node
totolinkn301rt_firmwareRange2.1.6
AND
totolinkn301rtMatch-

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.007 Low

EPSS

Percentile

81.0%

Related for NVD:CVE-2019-19823