CVE-2019-19824

Scores

EPSS

0.902high90.2%
0%20%40%60%80%100%

Percentile: 90.2%

CVSS

8.8high3.x
0246810

CVSS Score: 8.8/10

All CVSS Scores

CVSS 3.x
8.8

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
9.0

Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Description

On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device’s internals. This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, N100RE through 3.4.0, and N302RE 2.0.2.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-78

Vulnerable Software (8)

Type: Configuration

Vendor: *

Product: a3002ru_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:totolink:a3002ru_firmware:*:*:*:*:*:*:*:*",          "versionEndIncluding": "2.0.0",          "vulnerable": tr...

Source: nvd

Type: Configuration

Vendor: *

Product: a702r_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:totolink:a702r_firmware:*:*:*:*:*:*:*:*",          "versionEndIncluding": "2.1.3",          "vulnerable": true...

Source: nvd

Type: Configuration

Vendor: *

Product: n100re_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:totolink:n100re_firmware:*:*:*:*:*:*:*:*",          "versionEndIncluding": "3.4.0",          "vulnerable": tru...

Source: nvd

Type: Configuration

Vendor: *

Product: n150rt_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:totolink:n150rt_firmware:*:*:*:*:*:*:*:*",          "versionEndIncluding": "3.4.0",          "vulnerable": tru...

Source: nvd

Type: Configuration

Vendor: *

Product: n200re_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:totolink:n200re_firmware:*:*:*:*:*:*:*:*",          "versionEndIncluding": "4.0.0",          "vulnerable": tru...

Source: nvd

Type: Configuration

Vendor: *

Product: n300rt_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:totolink:n300rt_firmware:*:*:*:*:*:*:*:*",          "versionEndIncluding": "3.4.0",          "vulnerable": tru...

Source: nvd

Type: Configuration

Vendor: *

Product: n301rt_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:totolink:n301rt_firmware:*:*:*:*:*:*:*:*",          "versionEndIncluding": "2.1.6",          "vulnerable": tru...

Source: nvd

Type: Configuration

Vendor: *

Product: n302r_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:totolink:n302r_firmware:*:*:*:*:*:*:*:*",          "versionEndIncluding": "3.4.0",          "vulnerable": true...

Source: nvd

End of list