CVE-2019-19824
HIGH EXPLOITED IN THE WILD NUCLEITotolink A3002ru Firmware < 2.0.0 - OS Command Injection
Title source: ruleDescription
On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device's internals. This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, N100RE through 3.4.0, and N302RE 2.0.2.
Nuclei Templates (1)
TOTOLINK Realtek SD Routers - Remote Command Injection
HIGHby gy741
Scores
CVSS v3
8.8
EPSS
0.9021
EPSS Percentile
99.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2021-11-11
InTheWild.io
2021-11-11
CWE
CWE-78
Status
published
Products (8)
totolink/a3002ru_firmware
< 2.0.0
totolink/a702r_firmware
< 2.1.3
totolink/n100re_firmware
< 3.4.0
totolink/n150rt_firmware
< 3.4.0
totolink/n200re_firmware
< 4.0.0
totolink/n300rt_firmware
< 3.4.0
totolink/n301rt_firmware
< 2.1.6
totolink/n302r_firmware
< 3.4.0
Published
Jan 27, 2020
Tracked Since
Feb 18, 2026