CVE-2023-0617
TRENDNet TEW-811DRU httpd guestnetwork.asp buffer overflow
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability was found in TRENDNet TEW-811DRU 1.0.10.0. It has been classified as critical. This affects an unknown part of the file /wireless/guestnetwork.asp of the component httpd. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219957 was assigned to this vulnerability.
Es wurde eine Schwachstelle in TRENDNet TEW-811DRU 1.0.10.0 ausgemacht. Sie wurde als kritisch eingestuft. Es geht dabei um eine nicht klar definierte Funktion der Datei /wireless/guestnetwork.asp der Komponente httpd. Dank Manipulation mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-02-01 CVE Reserved
- 2023-02-01 CVE Published
- 2024-08-02 CVE Updated
- 2024-08-24 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
References (0)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Trendnet Search vendor "Trendnet" | Tew-811dru Firmware Search vendor "Trendnet" for product "Tew-811dru Firmware" | 1.0.10.0 Search vendor "Trendnet" for product "Tew-811dru Firmware" and version "1.0.10.0" | - |
Affected
| in | Trendnet Search vendor "Trendnet" | Tew-811dru Search vendor "Trendnet" for product "Tew-811dru" | - | - |
Safe
|