CVE-2019-19825: TOTOLINK/Realtek Routers – CAPTCHA Bypass

CVE-2019-19825: TOTOLINK/Realtek Routers - CAPTCHA Bypass-渗透云记 - 专注于网络安全与技术分享
CVE-2019-19825: TOTOLINK/Realtek Routers – CAPTCHA Bypass
此内容为付费阅读,请付费后查看
100积分
付费阅读

漏洞标题

CVE-2019-19825: TOTOLINK/Realtek Routers – CAPTCHA Bypass

漏洞描述

On certain TOTOLINK Realtek SDK based routers, the CAPTCHA text can be retrieved via a POST request to the boafrm/formLogin URI with the JSON payload {"topicurl":"setting/getSanvas"}. This allows an unauthenticated attacker to bypass CAPTCHA verification, gaining unauthorized access to restricted functions. Once valid credentials are known or brute-forced, an attacker can fully control the device using HTTP requests and Basic Authentication. Affected router models include A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, N100RE through 3.4.0, and other Realtek SDK-derived devices.

PoC代码

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享