Undocumented TELNET service in TRENDnet TEW-812DRU when a web page named backdoor contains an HTML parameter of password and a value of j78G¬DFdg_24Mhw3.
References
Link | Resource |
---|---|
https://www.ise.io/casestudies/exploiting-soho-routers/ | Mitigation Third Party Advisory |
https://www.ise.io/soho_service_hacks/ | Mitigation Third Party Advisory |
https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf | Third Party Advisory |
https://www.ise.io/casestudies/exploiting-soho-routers/ | Mitigation Third Party Advisory |
https://www.ise.io/soho_service_hacks/ | Mitigation Third Party Advisory |
https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.ise.io/casestudies/exploiting-soho-routers/ - Mitigation, Third Party Advisory | |
References | () https://www.ise.io/soho_service_hacks/ - Mitigation, Third Party Advisory | |
References | () https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf - Third Party Advisory |
Information
Published : 2019-11-13 22:15
Updated : 2024-11-21 01:53
NVD link : CVE-2013-3366
Mitre link : CVE-2013-3366
CVE.ORG link : CVE-2013-3366
JSON object : View
Products Affected
trendnet
- tew-812dru
- tew-812dru_firmware
CWE
CWE-352
Cross-Site Request Forgery (CSRF)