CVE-2019-13278
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
TRENDnet TEW-827DRU with firmware up to and including 2.04B03 contains multiple command injections when processing user input for the setup wizard, allowing an unauthenticated user to run arbitrary commands on the device. The vulnerability can be exercised on the local intranet or remotely if remote administration is enabled.
El dispositivo TEW-827DRU hasta la versión de firmware 2.04B03 e incluida de TRENDnet, contiene múltiples inyecciones de comandos al procesar la entrada del usuario para el asistente de configuración, lo que permite a un usuario no identificado ejecutar comandos arbitrarios en el dispositivo. La vulnerabilidad se puede ejercer en la intranet local o remotamente, si la administración remota está habilitada.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-07-04 CVE Reserved
- 2019-07-10 CVE Published
- 2023-10-19 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/fuzzywalls/TRENDNetExploits/tree/master/CVE-2019-13278 | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Trendnet Search vendor "Trendnet" | Tew-827dru Firmware Search vendor "Trendnet" for product "Tew-827dru Firmware" | <= 2.04b03 Search vendor "Trendnet" for product "Tew-827dru Firmware" and version " <= 2.04b03" | - |
Affected
| in | Trendnet Search vendor "Trendnet" | Tew-827dru Search vendor "Trendnet" for product "Tew-827dru" | 2.0 Search vendor "Trendnet" for product "Tew-827dru" and version "2.0" | - |
Safe
|