Description
On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device's internals. This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, N100RE through 3.4.0, and N302RE 2.0.2.
Published: 2020-01-27
Score: 8.8 High
EPSS: 90.2% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 21 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Totolink n302re Firmware
CPEs cpe:2.3:o:totolink:a3002ru_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:a702r_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:n100re_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:n150rt_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:n200re_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:n301rt_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:n302r_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:n302re_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink n302re Firmware
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 28 Aug 2024 15:30:00 +0000

Type Values Removed Values Added
Description On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device's internals. This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0. On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device's internals. This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, N100RE through 3.4.0, and N302RE 2.0.2.
References

Subscriptions

Totolink A3002ru A3002ru Firmware A702r A702r Firmware N100re N100re Firmware N150rt N150rt Firmware N200re N200re Firmware N300rt N300rt Firmware N301rt N301rt Firmware N302r N302r Firmware N302re Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-28T18:03:26.209Z

Reserved: 2019-12-16T00:00:00.000Z

Link: CVE-2019-19824

cve-icon Vulnrichment

Updated: 2024-08-05T02:25:12.740Z

cve-icon NVD

Status : Modified

Published: 2020-01-27T18:15:12.960

Modified: 2024-11-21T04:35:28.233

Link: CVE-2019-19824

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses