On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device's internals. This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, N100RE through 3.4.0, and N302RE 2.0.2.

Project Subscriptions

Vendors Products
Totolink Subscribe
A3002ru Subscribe
A3002ru Firmware Subscribe
A702r Firmware Subscribe
N100re Firmware Subscribe
N150rt Firmware Subscribe
N200re Firmware Subscribe
N300rt Firmware Subscribe
N301rt Firmware Subscribe
N302r Firmware Subscribe
N302re Firmware Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 21 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Totolink n302re Firmware
CPEs cpe:2.3:o:totolink:a3002ru_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:a702r_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:n100re_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:n150rt_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:n200re_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:n301rt_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:n302r_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:n302re_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink n302re Firmware
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 28 Aug 2024 15:30:00 +0000

Type Values Removed Values Added
Description On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device's internals. This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0. On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device's internals. This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, N100RE through 3.4.0, and N302RE 2.0.2.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-28T18:03:26.209Z

Reserved: 2019-12-16T00:00:00.000Z

Link: CVE-2019-19824

cve-icon Vulnrichment

Updated: 2024-08-05T02:25:12.740Z

cve-icon NVD

Status : Modified

Published: 2020-01-27T18:15:12.960

Modified: 2024-11-21T04:35:28.233

Link: CVE-2019-19824

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses