Show filters
130 Total Results
Displaying 81-90 of 130
Sort by:
Attacker Value
Unknown
CVE-2021-28843
Disclosure Date: August 10, 2021 (last updated February 23, 2025)
Null Pointer Dereference vulnerability exists in TRENDnet TEW-755AP 1.11B03, TEW-755AP2KAC 1.11B03, TEW-821DAP2KAC 1.11B03, and TEW-825DAP 1.11B03 by sending the POST request to apply_cgi with an unknown action name.
0
Attacker Value
Unknown
CVE-2021-28842
Disclosure Date: August 10, 2021 (last updated February 23, 2025)
Null Pointer Deference vulnerability exists in TRENDnet TEW-755AP 1.11B03, TEW-755AP2KAC 1.11B03, TEW-821DAP2KAC 1.11B03, and TEW-825DAP 1.11B03, which could let a remote malicious user cause a denial os service by sending the POST request to apply_cgi via action do_graph_auth without login_name key.
0
Attacker Value
Unknown
CVE-2021-31655
Disclosure Date: August 10, 2021 (last updated February 23, 2025)
Cross Site Scripting (XSS) vulnerability in TRENDnet TV-IP110WN V1.2.2.64 V1.2.2.65 V1.2.2.68 via the profile parameter. in a GET request in view.cgi.
0
Attacker Value
Unknown
CVE-2021-32424
Disclosure Date: June 17, 2021 (last updated February 22, 2025)
In TrendNet TW100-S4W1CA 2.3.32, due to a lack of proper session controls, a threat actor could make unauthorized changes to an affected router via a specially crafted web page. If an authenticated user were to interact with a malicious web page it could allow for a complete takeover of the router.
0
Attacker Value
Unknown
CVE-2021-32426
Disclosure Date: June 17, 2021 (last updated February 22, 2025)
In TrendNet TW100-S4W1CA 2.3.32, it is possible to inject arbitrary JavaScript into the router's web interface via the "echo" command.
0
Attacker Value
Unknown
CVE-2020-14076
Disclosure Date: June 15, 2020 (last updated February 21, 2025)
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action st_dev_connect, st_dev_disconnect, or st_dev_rconnect with a sufficiently long wan_type key.
0
Attacker Value
Unknown
CVE-2020-14074
Disclosure Date: June 15, 2020 (last updated February 21, 2025)
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action kick_ban_wifi_mac_allow with a sufficiently long qcawifi.wifi0_vap0.maclist key.
0
Attacker Value
Unknown
CVE-2020-14078
Disclosure Date: June 15, 2020 (last updated February 21, 2025)
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action wifi_captive_portal_login with a sufficiently long REMOTE_ADDR key.
0
Attacker Value
Unknown
CVE-2020-14079
Disclosure Date: June 15, 2020 (last updated February 21, 2025)
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action auto_up_fw (or auto_up_lp) with a sufficiently long update_file_name key.
0
Attacker Value
Unknown
CVE-2020-14077
Disclosure Date: June 15, 2020 (last updated February 21, 2025)
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action set_sta_enrollee_pin_wifi1 (or set_sta_enrollee_pin_wifi0) with a sufficiently long wps_sta_enrollee_pin key.
0