Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-19825 PoC — 多款TotoLink产品授权问题漏洞

Source
Associated Vulnerability
Title:多款TotoLink产品授权问题漏洞 (CVE-2019-19825)
Description:多款TotoLink产品中存在授权问题漏洞。攻击者可利用该漏洞绕过CAPTCHA保护,登录到路由器上。以下产品及版本受到影响:TotoLink A3002RU 2.0.0及之前的版本;A702R 2.1.3及之前的版本;N301RT 2.1.6及之前的版本;N302R 3.4.0及之前的版本;N300RT 3.4.0及之前的版本;N200RE 4.0.0及之前的版本;N150RT 3.4.0及之前的版本;N100RE 3.4.0及之前的版本。
Description
On certain TOTOLINK Realtek SDK based routers, the CAPTCHA text can be retrieved via a POST request to the boafrm/formLogin URI with the JSON payload {"topicurl":"setting/getSanvas"}. This allows an unauthenticated attacker to bypass CAPTCHA verification, gaining unauthorized access to restricted functions. Once valid credentials are known or brute-forced, an attacker can fully control the device using HTTP requests and Basic Authentication. Affected router models include A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, N100RE through 3.4.0, and other Realtek SDK-derived devices.
File Snapshot

id: CVE-2019-19825 info: name: TOTOLINK/Realtek Routers - CAPTCHA Bypass author: ritikchaddha ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.