Описание
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action set_sta_enrollee_pin_wifi1 (or set_sta_enrollee_pin_wifi0) with a sufficiently long wps_sta_enrollee_pin key.
Ссылки
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.06b04 (включая)
Одновременно
cpe:2.3:o:trendnet:tew-827dru_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:tew-827dru:-:*:*:*:*:*:*:*
EPSS
Процентиль: 87%
0.03384
Низкий
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-787
Связанные уязвимости
github
больше 3 лет назад
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action set_sta_enrollee_pin_wifi1 (or set_sta_enrollee_pin_wifi0) with a sufficiently long wps_sta_enrollee_pin key.
EPSS
Процентиль: 87%
0.03384
Низкий
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-787