QID 731298
Date Published: 2024-03-28
QID 731298: Realtek Jungle Software Development Kit (SDK) Command Injection Vulnerability
There is a command injection vulnerability in the "formWsc" page of the management interface. Successful exploitation of this vulnerability could lead to remote code execution and compromise of the affected system
Affected Projects:
Realtek AP-Router SDK
Affected Versions:
rtl819x-SDK-v3.2.x Series
rtl819x-SDK-v3.4.x Series
rtl819x-SDK-v3.4T Series
rtl819x-SDK-v3.4T-CT Series
rtl819x-eCos-v1.5.x Series
QID Detection Logic (Unauthenticated):
This QID sends a crafted payload as an HTTP POST request that triggers a callback to the scanner, if vulnerable. Please note that this QID relies on a callback to the scanner on a random port. The target must be enabled to connect back to any random port on the scanner.
Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to execute arbitrary code, leading to complete system compromise.
- Realtek Security Advisory -
www.realtek.com/images/safe-report/Realtek_APRouter_SDK_Advisory-CVE-2021-35392_35395.pdf
CVEs related to QID 731298
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| Realtek Security Advisory |
|