CVE-2023-0638 – TRENDnet TEW-811DRU Web Interface command injection
https://notcve.org/view.php?id=CVE-2023-0638
A vulnerability has been found in TRENDnet TEW-811DRU 1.0.10.0 and classified as critical. This vulnerability affects unknown code of the component Web Interface. The manipulation leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://vuldb.com/?ctiid.220018 https://vuldb.com/?id.220018 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2023-0637 – TRENDnet TEW-811DRU Web Management Interface wan.asp memory corruption
https://notcve.org/view.php?id=CVE-2023-0637
A vulnerability, which was classified as critical, was found in TRENDnet TEW-811DRU 1.0.10.0. This affects an unknown part of the file wan.asp of the component Web Management Interface. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://vuldb.com/?ctiid.220017 https://vuldb.com/?id.220017 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-787: Out-of-bounds Write •
CVE-2023-0617 – TRENDNet TEW-811DRU httpd guestnetwork.asp buffer overflow
https://notcve.org/view.php?id=CVE-2023-0617
A vulnerability was found in TRENDNet TEW-811DRU 1.0.10.0. It has been classified as critical. This affects an unknown part of the file /wireless/guestnetwork.asp of the component httpd. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. • https://vuldb.com/?ctiid.219957 https://vuldb.com/?id.219957 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2023-0613 – TRENDnet TEW-811DRU httpd security.asp memory corruption
https://notcve.org/view.php?id=CVE-2023-0613
A vulnerability has been found in TRENDnet TEW-811DRU 1.0.10.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /wireless/security.asp of the component httpd. The manipulation leads to memory corruption. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://vuldb.com/?ctiid.219937 https://vuldb.com/?id.219937 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2023-0612 – TRENDnet TEW-811DRU httpd basic.asp buffer overflow
https://notcve.org/view.php?id=CVE-2023-0612
A vulnerability, which was classified as critical, was found in TRENDnet TEW-811DRU 1.0.10.0. Affected is an unknown function of the file /wireless/basic.asp of the component httpd. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://vuldb.com/?ctiid.219936 https://vuldb.com/?id.219936 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •