QID 731298

Date Published: 2024-03-28

QID 731298: Realtek Jungle Software Development Kit (SDK) Command Injection Vulnerability

There is a command injection vulnerability in the "formWsc" page of the management interface. Successful exploitation of this vulnerability could lead to remote code execution and compromise of the affected system

Affected Projects:
Realtek AP-Router SDK

Affected Versions:
rtl819x-SDK-v3.2.x Series
rtl819x-SDK-v3.4.x Series
rtl819x-SDK-v3.4T Series
rtl819x-SDK-v3.4T-CT Series
rtl819x-eCos-v1.5.x Series

QID Detection Logic (Unauthenticated):
This QID sends a crafted payload as an HTTP POST request that triggers a callback to the scanner, if vulnerable. Please note that this QID relies on a callback to the scanner on a random port. The target must be enabled to connect back to any random port on the scanner.

Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to execute arbitrary code, leading to complete system compromise.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    Customers are advised to apply the latest patches provided by Realtek. For more information, please refer to the Realtek Security Advisory

    CVEs related to QID 731298

    Software Advisories
    Advisory ID Software Component Link
    Realtek Security Advisory URL Logo www.realtek.com/images/safe-report/Realtek_APRouter_SDK_Advisory-CVE-2021-35392_35395.pdf