A command injection issue in TRENDnet TEW-411BRPplus v.2.07_eu that allows a local attacker to execute arbitrary code via the data1 parameter in the debug.cgi page.
References
Link | Resource |
---|---|
https://warp-desk-89d.notion.site/TEW-411BRPplus-9bafe26e48964be3be12eab47f77203d | Exploit Third Party Advisory |
https://www.trendnet.com/support/support-detail.asp?prod=160_TEW-411BRPplus | Product |
https://warp-desk-89d.notion.site/TEW-411BRPplus-9bafe26e48964be3be12eab47f77203d | Exploit Third Party Advisory |
https://www.trendnet.com/support/support-detail.asp?prod=160_TEW-411BRPplus | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://warp-desk-89d.notion.site/TEW-411BRPplus-9bafe26e48964be3be12eab47f77203d - Exploit, Third Party Advisory | |
References | () https://www.trendnet.com/support/support-detail.asp?prod=160_TEW-411BRPplus - Product |
31 Jan 2024, 23:32
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:trendnet:tew-411brpplus_firmware:2.07_eu:*:*:*:*:*:*:* cpe:2.3:h:trendnet:tew-411brpplus:-:*:*:*:*:*:*:* |
|
CWE | CWE-77 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
References | () https://www.trendnet.com/support/support-detail.asp?prod=160_TEW-411BRPplus - Product | |
References | () https://warp-desk-89d.notion.site/TEW-411BRPplus-9bafe26e48964be3be12eab47f77203d - Exploit, Third Party Advisory |
25 Jan 2024, 22:18
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-25 22:15
Updated : 2024-11-21 08:38
NVD link : CVE-2023-51833
Mitre link : CVE-2023-51833
CVE.ORG link : CVE-2023-51833
JSON object : View
Products Affected
trendnet
- tew-411brpplus_firmware
- tew-411brpplus
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')