CVE-2023-0613 – TRENDnet TEW-811DRU httpd security.asp memory corruption
https://notcve.org/view.php?id=CVE-2023-0613
A vulnerability has been found in TRENDnet TEW-811DRU 1.0.10.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /wireless/security.asp of the component httpd. The manipulation leads to memory corruption. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://vuldb.com/?ctiid.219937 https://vuldb.com/?id.219937 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2023-0612 – TRENDnet TEW-811DRU httpd basic.asp buffer overflow
https://notcve.org/view.php?id=CVE-2023-0612
A vulnerability, which was classified as critical, was found in TRENDnet TEW-811DRU 1.0.10.0. Affected is an unknown function of the file /wireless/basic.asp of the component httpd. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://vuldb.com/?ctiid.219936 https://vuldb.com/?id.219936 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2023-0611 – TRENDnet TEW-652BRP Web Management Interface get_set.ccp command injection
https://notcve.org/view.php?id=CVE-2023-0611
A vulnerability, which was classified as critical, has been found in TRENDnet TEW-652BRP 3.04B01. This issue affects some unknown processing of the file get_set.ccp of the component Web Management Interface. The manipulation leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://vuldb.com/?ctiid.219935 https://vuldb.com/?id.219935 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2023-24099
https://notcve.org/view.php?id=CVE-2023-24099
TrendNet Wireless AC Easy-Upgrader TEW-820AP v1.0R, firmware version 1.01.B01 was discovered to contain a stack overflow via the username parameter at /formWizardPassword. This vulnerability allows attackers to execute arbitrary code via a crafted payload. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Se descubrió que TrendNet Wireless AC Easy-Upgrader TEW-820AP v1.0R, versión de firmware 1.01.B01, contenía un desbordamiento de pila a través del parámetro de nombre de usuario en /formWizardPassword. Esta vulnerabilidad permite a los atacantes ejecutar código arbitrario mediante un payload manipulado inyectado. • https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/07/README.md • CWE-787: Out-of-bounds Write •
CVE-2023-24096
https://notcve.org/view.php?id=CVE-2023-24096
TrendNet Wireless AC Easy-Upgrader TEW-820AP v1.0R, firmware version 1.01.B01 was discovered to contain a stack overflow via the newpass parameter at /formPasswordSetup. This vulnerability allows attackers to execute arbitrary code via a crafted payload. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Se descubrió que TrendNet Wireless AC Easy-Upgrader TEW-820AP v1.0R, versión de firmware 1.01.B01, contenía un desbordamiento de pila a través del parámetro newpass en /formPasswordSetup. Esta vulnerabilidad permite a los atacantes ejecutar código arbitrario mediante un payload manipulado inyectado. • https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/06/README.md • CWE-787: Out-of-bounds Write •