CVE-2019-19822

A certain router administration interface (that includes Realtek APMIB 0.11f for Boa 0.94.14rc21) allows remote attackers to retrieve the configuration, including sensitive data (usernames and passwords). This affects TOTOLINK A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0; Rutek RTK 11N AP through 2019-12-12; Sapido GR297n through 2019-12-12; CIK TELECOM MESH ROUTER through 2019-12-12; KCTVJEJU Wireless AP through 2019-12-12; Fibergate FGN-R2 through 2019-12-12; Hi-Wifi MAX-C300N through 2019-12-12; HCN MAX-C300N through 2019-12-12; T-broad GN-866ac through 2019-12-12; Coship EMTA AP through 2019-12-12; and IO-Data WN-AC1167R through 2019-12-12.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:a3002ru_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a3002ru:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:totolink:a702r_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a702r:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:totolink:n302r_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:totolink:n302r:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:totolink:n300rt_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:totolink:n300rt:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:totolink:n200re_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:totolink:n200re:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:totolink:n150rt_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:totolink:n150rt:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:totolink:n100re_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:totolink:n100re:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:realtek:rtk_11n_ap_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:realtek:rtk_11n_ap:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:sapido:gr297n_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sapido:gr297n:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:ciktel:mesh_router_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ciktel:mesh_router:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:kctvjeju:wireless_ap_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:kctvjeju:wireless_ap:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:fg-products:fgn-r2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:fg-products:fgn-r2:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:hiwifi:max-c300n_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hiwifi:max-c300n:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:tbroad:gn-866ac_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tbroad:gn-866ac:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:coship:emta_ap_firmwre:*:*:*:*:*:*:*:*
cpe:2.3:h:coship:emta_ap:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:iodata:wn-ac1167r_firmwre:*:*:*:*:*:*:*:*
cpe:2.3:h:iodata:wn-ac1167r:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:hcn_max-c300n_project:hcn_max-c300n_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hcn_max-c300n_project:hcn_max-c300n:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:totolink:n301rt_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:totolink:n301rt:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:35

Type Values Removed Values Added
References () http://opensource.actiontec.com/sourcecode/wcb3000x/wecb3000n_gpl_0.16.8.4.tgz - Exploit, Third Party Advisory () http://opensource.actiontec.com/sourcecode/wcb3000x/wecb3000n_gpl_0.16.8.4.tgz - Exploit, Third Party Advisory
References () http://packetstormsecurity.com/files/156083/Realtek-SDK-Information-Disclosure-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/156083/Realtek-SDK-Information-Disclosure-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2020/Jan/36 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2020/Jan/36 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2020/Jan/38 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2020/Jan/38 - Exploit, Mailing List, Third Party Advisory
References () https://github.com/Saturn49/wecb/blob/755ce19a493c78270c04b5aaf39664f0cddbb420/rtl819x/users/boa/apmib/apmib.h#L13 - Third Party Advisory () https://github.com/Saturn49/wecb/blob/755ce19a493c78270c04b5aaf39664f0cddbb420/rtl819x/users/boa/apmib/apmib.h#L13 - Third Party Advisory
References () https://sploit.tech - Third Party Advisory () https://sploit.tech - Third Party Advisory

Information

Published : 2020-01-27 18:15

Updated : 2024-11-21 04:35


NVD link : CVE-2019-19822

Mitre link : CVE-2019-19822

CVE.ORG link : CVE-2019-19822


JSON object : View

Products Affected

sapido

  • gr297n_firmware
  • gr297n

totolink

  • n301rt
  • n302r_firmware
  • n200re_firmware
  • a702r
  • n100re_firmware
  • n100re
  • n300rt
  • a3002ru_firmware
  • a3002ru
  • n301rt_firmware
  • n150rt
  • n300rt_firmware
  • n200re
  • a702r_firmware
  • n302r
  • n150rt_firmware

hcn_max-c300n_project

  • hcn_max-c300n
  • hcn_max-c300n_firmware

fg-products

  • fgn-r2_firmware
  • fgn-r2

hiwifi

  • max-c300n_firmware
  • max-c300n

coship

  • emta_ap
  • emta_ap_firmwre

ciktel

  • mesh_router
  • mesh_router_firmware

iodata

  • wn-ac1167r_firmwre
  • wn-ac1167r

kctvjeju

  • wireless_ap_firmware
  • wireless_ap

realtek

  • rtk_11n_ap
  • rtk_11n_ap_firmware

tbroad

  • gn-866ac
  • gn-866ac_firmware
CWE
CWE-306

Missing Authentication for Critical Function