system.cgi on TRENDnet TV-IP110WN cameras has a buffer overflow caused by an inadequate source-length check before a strcpy operation in the respondAsp function. Attackers can exploit the vulnerability by using the languse parameter with a long string. This affects 1.2.2 build 28, 64, 65, and 68.
References
Link | Resource |
---|---|
https://github.com/zyw-200/IOTFuzzer/blob/master/Trendnet_response.png | Third Party Advisory |
https://github.com/zyw-200/IOTFuzzer/blob/master/Trendnet_response.png | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/zyw-200/IOTFuzzer/blob/master/Trendnet_response.pngĀ - Third Party Advisory |
Information
Published : 2019-04-22 11:29
Updated : 2024-11-21 04:21
NVD link : CVE-2019-11417
Mitre link : CVE-2019-11417
CVE.ORG link : CVE-2019-11417
JSON object : View
Products Affected
trendnet
- tv-ip110wn
- tv-ip110wn_firmware