CrowdSec
1/10CrowdSec Score

TOTOLINK - Authentication Bypass (CVE-2019-19825)

Published on27-01-2020
First seen on15-12-2025
Public ExploitCVSS 9.8/10TOTOLINK - N150RT

399Exploiting IPs reported

On certain TOTOLINK Realtek SDK based routers, the CAPTCHA text can be retrieved via an {"topicurl":"setting/getSanvas"} POST to the boafrm/formLogin URI, leading to a CAPTCHA bypass. (Also, the CAPTCHA text is not needed once the attacker has determined valid credentials. The attacker can perform router actions via HTTP requests with Basic Authentication.) This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0.

CrowdSec analysis

CVE-2019-19825 is a critical vulnerability in certain TOTOLINK Realtek SDK-based routers that allows attackers to bypass CAPTCHA protections by retrieving the CAPTCHA text via a crafted POST request. This flaw enables remote attackers to automate login attempts and, once valid credentials are obtained, perform unauthorized router actions through HTTP requests with Basic Authentication. The vulnerability exposes affected devices to risks such as unauthorized configuration changes and potential network compromise.

CrowdSec has been tracking this vulnerability and its exploits since 10th of December 2025.

CrowdSec network data shows that most actors exploiting CVE-2019-19825 rely on broad, untargeted scans with minimal filtering. The activity is largely automated and opportunistic in nature. CrowdSec network telemetry also shows that exploitation of CVE-2019-19825 has significantly declined over the past week. Attack volumes are well below the long-term average, suggesting attackers are rapidly losing interest. The vulnerability appears to be falling out of active use across most threat landscapes.

Attackers exploit the CAPTCHA bypass by sending a POST request with the payload {"topicurl":"setting/getSanvas"} to the /boafrm/formLogin endpoint on TOTOLINK and Realtek-based routers, allowing them to retrieve the CAPTCHA value and facilitate unauthorized access.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.