Show filters
130 Total Results
Displaying 101-110 of 130
Sort by:
Attacker Value
Unknown
CVE-2019-11399
Disclosure Date: August 14, 2019 (last updated November 27, 2024)
An issue was discovered on TRENDnet TEW-651BR 2.04B1, TEW-652BRP 3.04b01, and TEW-652BRU 1.00b12 devices. OS command injection occurs through the get_set.ccp lanHostCfg_HostName_1.1.1.0.0 parameter.
0
Attacker Value
Unknown
CVE-2019-11400
Disclosure Date: August 14, 2019 (last updated November 27, 2024)
An issue was discovered on TRENDnet TEW-651BR 2.04B1, TEW-652BRP 3.04b01, and TEW-652BRU 1.00b12 devices. A buffer overflow occurs through the get_set.ccp ccp_act parameter.
0
Attacker Value
Unknown
CVE-2019-13278
Disclosure Date: July 10, 2019 (last updated November 27, 2024)
TRENDnet TEW-827DRU with firmware up to and including 2.04B03 contains multiple command injections when processing user input for the setup wizard, allowing an unauthenticated user to run arbitrary commands on the device. The vulnerability can be exercised on the local intranet or remotely if remote administration is enabled.
0
Attacker Value
Unknown
CVE-2019-13276
Disclosure Date: July 10, 2019 (last updated November 27, 2024)
TRENDnet TEW-827DRU with firmware up to and including 2.04B03 contains a stack-based buffer overflow in the ssi binary. The overflow allows an unauthenticated user to execute arbitrary code by providing a sufficiently long query string when POSTing to any valid cgi, txt, asp, or js file. The vulnerability can be exercised on the local intranet or remotely if remote administration is enabled.
0
Attacker Value
Unknown
CVE-2019-13279
Disclosure Date: July 10, 2019 (last updated November 27, 2024)
TRENDnet TEW-827DRU with firmware up to and including 2.04B03 contains multiple stack-based buffer overflows when processing user input for the setup wizard, allowing an unauthenticated user to execute arbitrary code. The vulnerability can be exercised on the local intranet or remotely if remote administration is enabled.
0
Attacker Value
Unknown
CVE-2019-13277
Disclosure Date: July 09, 2019 (last updated November 27, 2024)
TRENDnet TEW-827DRU with firmware up to and including 2.04B03 allows an unauthenticated attacker to execute setup wizard functionality, giving this attacker the ability to change configuration values, potentially leading to a denial of service. The request can be made on the local intranet or remotely if remote administration is enabled.
0
Attacker Value
Unknown
CVE-2019-13280
Disclosure Date: July 09, 2019 (last updated November 27, 2024)
TRENDnet TEW-827DRU with firmware up to and including 2.04B03 contains a stack-based buffer overflow while returning an error message to the user about failure to resolve a hostname during a ping or traceroute attempt. This allows an authenticated user to execute arbitrary code. The exploit can be exercised on the local intranet or remotely if remote administration is enabled.
0
Attacker Value
Unknown
CVE-2019-13152
Disclosure Date: July 02, 2019 (last updated November 27, 2024)
An issue was discovered in TRENDnet TEW-827DRU firmware before 2.05B11. There is a command injection in apply.cgi (exploitable with authentication) via the IP Address in Add Gaming Rule.
0
Attacker Value
Unknown
CVE-2019-13155
Disclosure Date: July 02, 2019 (last updated November 27, 2024)
An issue was discovered in TRENDnet TEW-827DRU firmware before 2.05B11. There is a command injection in apply.cgi (exploitable with authentication) via the IP Address in Add Virtual Server.
0
Attacker Value
Unknown
CVE-2019-13154
Disclosure Date: July 02, 2019 (last updated November 27, 2024)
An issue was discovered in TRENDnet TEW-827DRU firmware before 2.05B11. There is a command injection in apply.cgi (exploitable with authentication) via the TCP Ports To Open in Add Gaming Rule.
0