On certain TOTOLINK Realtek SDK based routers, the CAPTCHA text can be retrieved via an {"topicurl":"setting/getSanvas"} POST to the boafrm/formLogin URI, leading to a CAPTCHA bypass. (Also, the CAPTCHA text is not needed once the attacker has determined valid credentials. The attacker can perform router actions via HTTP requests with Basic Authentication.) This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0.

Project Subscriptions

Vendors Products
Totolink Subscribe
A3002ru Subscribe
A3002ru Firmware Subscribe
A702r Firmware Subscribe
N100re Firmware Subscribe
N150rt Firmware Subscribe
N200re Firmware Subscribe
N300rt Firmware Subscribe
N301rt Firmware Subscribe
N302r Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2019-9423 On certain TOTOLINK Realtek SDK based routers, the CAPTCHA text can be retrieved via an {"topicurl":"setting/getSanvas"} POST to the boafrm/formLogin URI, leading to a CAPTCHA bypass. (Also, the CAPTCHA text is not needed once the attacker has determined valid credentials. The attacker can perform router actions via HTTP requests with Basic Authentication.) This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T02:25:12.701Z

Reserved: 2019-12-16T00:00:00.000Z

Link: CVE-2019-19825

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-01-27T17:15:12.167

Modified: 2024-11-21T04:35:28.407

Link: CVE-2019-19825

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses