CVE-2023-0612

A vulnerability, which was classified as critical, was found in TRENDnet TEW-811DRU 1.0.10.0. Affected is an unknown function of the file /wireless/basic.asp of the component httpd. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-219936.
References
Link Resource
https://vuldb.com/?ctiid.219936 Permissions Required Third Party Advisory
https://vuldb.com/?id.219936 Permissions Required Third Party Advisory
https://vuldb.com/?ctiid.219936 Permissions Required Third Party Advisory
https://vuldb.com/?id.219936 Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:trendnet:tew-811dru_firmware:1.0.10.0:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:tew-811dru:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:37

Type Values Removed Values Added
References () https://vuldb.com/?ctiid.219936 - Permissions Required, Third Party Advisory () https://vuldb.com/?ctiid.219936 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?id.219936 - Permissions Required, Third Party Advisory () https://vuldb.com/?id.219936 - Permissions Required, Third Party Advisory

Information

Published : 2023-02-01 14:15

Updated : 2024-11-21 07:37


NVD link : CVE-2023-0612

Mitre link : CVE-2023-0612

CVE.ORG link : CVE-2023-0612


JSON object : View

Products Affected

trendnet

  • tew-811dru_firmware
  • tew-811dru
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')