Show filters
130 Total Results
Displaying 51-60 of 130
Sort by:
Attacker Value
Unknown

CVE-2022-31873

Disclosure Date: June 17, 2022 (last updated February 23, 2025)
Trendnet IP-110wn camera fw_tv-ip110wn_v2(1.2.2.68) has an XSS vulnerability via the prefix parameter in /admin/general.cgi.
Attacker Value
Unknown

CVE-2022-30329

Disclosure Date: June 16, 2022 (last updated February 23, 2025)
An issue was found on TRENDnet TEW-831DR 1.0 601.130.1.1356 devices. An OS injection vulnerability exists within the web interface, allowing an attacker with valid credentials to execute arbitrary shell commands.
Attacker Value
Unknown

CVE-2022-30328

Disclosure Date: June 16, 2022 (last updated February 23, 2025)
An issue was found on TRENDnet TEW-831DR 1.0 601.130.1.1356 devices. The username and password setup for the web interface does not require entering the existing password. A malicious user can change the username and password of the interface.
Attacker Value
Unknown

CVE-2022-30327

Disclosure Date: June 16, 2022 (last updated February 23, 2025)
An issue was found on TRENDnet TEW-831DR 1.0 601.130.1.1356 devices. The web interface is vulnerable to CSRF. An attacker can change the pre-shared key of the Wi-Fi router if the interface's IP address is known.
Attacker Value
Unknown

CVE-2022-30326

Disclosure Date: June 16, 2022 (last updated February 23, 2025)
An issue was found on TRENDnet TEW-831DR 1.0 601.130.1.1356 devices. The network pre-shared key field on the web interface is vulnerable to XSS. An attacker can use a simple XSS payload to crash the basic.config page of the web interface.
Attacker Value
Unknown

CVE-2022-30325

Disclosure Date: June 16, 2022 (last updated February 23, 2025)
An issue was found on TRENDnet TEW-831DR 1.0 601.130.1.1356 devices. The default pre-shared key for the Wi-Fi networks is the same for every router except for the last four digits. The device default pre-shared key for both 2.4 GHz and 5 GHz networks can be guessed or brute-forced by an attacker within range of the Wi-Fi network.
Attacker Value
Unknown

CVE-2021-33317

Disclosure Date: May 11, 2022 (last updated February 23, 2025)
The TRENDnet TI-PG1284i switch(hw v2.0R) prior to version 2.0.2.S0 suffers from a null pointer dereference vulnerability. This vulnerability exists in its lldp related component. Due to fail to check if ChassisID TLV is contained in the packet, by sending a crafted lldp packet to the device, an attacker can crash the process due to null pointer dereference.
Attacker Value
Unknown

CVE-2021-33316

Disclosure Date: May 11, 2022 (last updated February 23, 2025)
The TRENDnet TI-PG1284i switch(hw v2.0R) prior to version 2.0.2.S0 suffers from an integer underflow vulnerability. This vulnerability exists in its lldp related component. Due to lack of proper validation on length field of ChassisID TLV, by sending a crafted lldp packet to the device, integer underflow would occur and the negative number will be passed to memcpy() later, which may cause buffer overflow or invalid memory access.
Attacker Value
Unknown

CVE-2021-33315

Disclosure Date: May 11, 2022 (last updated February 23, 2025)
The TRENDnet TI-PG1284i switch(hw v2.0R) prior to version 2.0.2.S0 suffers from an integer underflow vulnerability. This vulnerability exists in its lldp related component. Due to lack of proper validation on length field of PortID TLV, by sending a crafted lldp packet to the device, integer underflow would occur and the negative number will be passed to memcpy() later, which may cause buffer overflow or invalid memory access.
Attacker Value
Unknown

CVE-2021-20165

Disclosure Date: December 30, 2021 (last updated February 23, 2025)
Trendnet AC2600 TEW-827DRU version 2.08B01 does not properly implement csrf protections. Most pages lack proper usage of CSRF protections or mitigations. Additionally, pages that do make use of CSRF tokens are trivially bypassable as the server does not appear to validate them properly (i.e. re-using an old token or finding the token thru some other method is possible).