CVE编号
CVE-2019-19823利用情况
暂无补丁情况
N/A披露时间
2020-01-28漏洞描述
A certain router administration interface (that includes Realtek APMIB 0.11f for Boa 0.94.14rc21) stores cleartext administrative passwords in flash memory and in a file. This affects TOTOLINK A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0; Rutek RTK 11N AP through 2019-12-12; Sapido GR297n through 2019-12-12; CIK TELECOM MESH ROUTER through 2019-12-12; KCTVJEJU Wireless AP through 2019-12-12; Fibergate FGN-R2 through 2019-12-12; Hi-Wifi MAX-C300N through 2019-12-12; HCN MAX-C300N through 2019-12-12; T-broad GN-866ac through 2019-12-12; Coship EMTA AP through 2019-12-12; and IO-Data WN-AC1167R through 2019-12-12.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://opensource.actiontec.com/sourcecode/wcb3000x/wecb3000n_gpl_0.16.8.4.tgz | |
http://packetstormsecurity.com/files/156083/Realtek-SDK-Information-Disclosur... | |
http://seclists.org/fulldisclosure/2020/Jan/36 | |
http://seclists.org/fulldisclosure/2020/Jan/38 | |
https://github.com/Saturn49/wecb/blob/755ce19a493c78270c04b5aaf39664f0cddbb42... | |
https://sploit.tech |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | ciktel | mesh_router_firmware | * |
Up to (including) 2019-12-12 |
|||||
运行在以下环境 | |||||||||
系统 | coship | emta_ap_firmwre | * |
Up to (including) 2019-12-12 |
|||||
运行在以下环境 | |||||||||
系统 | fg-products | fgn-r2_firmware | * |
Up to (including) 2019-12-12 |
|||||
运行在以下环境 | |||||||||
系统 | hcn_max-c300n_project | hcn_max-c300n_firmware | * |
Up to (including) 2019-12-12 |
|||||
运行在以下环境 | |||||||||
系统 | hiwifi | max-c300n_firmware | * |
Up to (including) 2019-12-12 |
|||||
运行在以下环境 | |||||||||
系统 | iodata | wn-ac1167r_firmwre | * |
Up to (including) 2019-12-12 |
|||||
运行在以下环境 | |||||||||
系统 | kctvjeju | wireless_ap_firmware | * |
Up to (including) 2019-12-12 |
|||||
运行在以下环境 | |||||||||
系统 | realtek | rtk_11n_ap_firmware | * |
Up to (including) 2019-12-12 |
|||||
运行在以下环境 | |||||||||
系统 | sapido | gr297n_firmware | * |
Up to (including) 2019-12-12 |
|||||
运行在以下环境 | |||||||||
系统 | tbroad | gn-866ac_firmware | * |
Up to (including) 2019-12-12 |
|||||
运行在以下环境 | |||||||||
系统 | totolink | a3002ru_firmware | * |
Up to (including) 2.0.0 |
|||||
运行在以下环境 | |||||||||
系统 | totolink | a702r_firmware | * |
Up to (including) 2.1.3 |
|||||
运行在以下环境 | |||||||||
系统 | totolink | n100re_firmware | * |
Up to (including) 3.4.0 |
|||||
运行在以下环境 | |||||||||
系统 | totolink | n150rt_firmware | * |
Up to (including) 3.4.0 |
|||||
运行在以下环境 | |||||||||
系统 | totolink | n200re_firmware | * |
Up to (including) 4.0.0 |
|||||
运行在以下环境 | |||||||||
系统 | totolink | n300rt_firmware | * |
Up to (including) 3.4.0 |
|||||
运行在以下环境 | |||||||||
系统 | totolink | n301rt_firmware | * |
Up to (including) 2.1.6 |
|||||
运行在以下环境 | |||||||||
系统 | totolink | n302r_firmware | * |
Up to (including) 3.4.0 |
|||||
运行在以下环境 | |||||||||
硬件 | ciktel | mesh_router | - | - | |||||
运行在以下环境 | |||||||||
硬件 | coship | emta_ap | - | - | |||||
运行在以下环境 | |||||||||
硬件 | fg-products | fgn-r2 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | hcn_max-c300n_project | hcn_max-c300n | - | - | |||||
运行在以下环境 | |||||||||
硬件 | hiwifi | max-c300n | - | - | |||||
运行在以下环境 | |||||||||
硬件 | iodata | wn-ac1167r | - | - | |||||
运行在以下环境 | |||||||||
硬件 | kctvjeju | wireless_ap | - | - | |||||
运行在以下环境 | |||||||||
硬件 | realtek | rtk_11n_ap | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sapido | gr297n | - | - | |||||
运行在以下环境 | |||||||||
硬件 | tbroad | gn-866ac | - | - | |||||
运行在以下环境 | |||||||||
硬件 | totolink | a3002ru | - | - | |||||
运行在以下环境 | |||||||||
硬件 | totolink | a702r | - | - | |||||
运行在以下环境 | |||||||||
硬件 | totolink | n100re | - | - | |||||
运行在以下环境 | |||||||||
硬件 | totolink | n150rt | - | - | |||||
运行在以下环境 | |||||||||
硬件 | totolink | n200re | - | - | |||||
运行在以下环境 | |||||||||
硬件 | totolink | n300rt | - | - | |||||
运行在以下环境 | |||||||||
硬件 | totolink | n301rt | - | - | |||||
运行在以下环境 | |||||||||
硬件 | totolink | n302r | - | - | |||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 无
- 保密性 高
- 完整性 无
还没有评论,来说两句吧...