Описание
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action auto_up_fw (or auto_up_lp) with a sufficiently long update_file_name key.
Ссылки
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.06b04 (включая)
Одновременно
cpe:2.3:o:trendnet:tew-827dru_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:tew-827dru:-:*:*:*:*:*:*:*
EPSS
Процентиль: 89%
0.04895
Низкий
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-787
Связанные уязвимости
github
больше 3 лет назад
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action auto_up_fw (or auto_up_lp) with a sufficiently long update_file_name key.
EPSS
Процентиль: 89%
0.04895
Низкий
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-787