TrendNet Wireless AC Easy-Upgrader TEW-820AP v1.0R, firmware version 1.01.B01 was discovered to contain a stack overflow via the submit-url parameter at /formSystemCheck. This vulnerability allows attackers to execute arbitrary code via a crafted payload. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link | Resource |
---|---|
https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/05/README.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
11 Apr 2024, 01:18
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
07 Nov 2023, 04:08
Type | Values Removed | Values Added |
---|---|---|
Summary | TrendNet Wireless AC Easy-Upgrader TEW-820AP v1.0R, firmware version 1.01.B01 was discovered to contain a stack overflow via the submit-url parameter at /formSystemCheck. This vulnerability allows attackers to execute arbitrary code via a crafted payload. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. |
01 Feb 2023, 14:00
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:trendnet:tew-820ap:1.0r:*:*:*:*:*:*:* cpe:2.3:o:trendnet:tew-820ap_firmware:1.01.b01:*:*:*:*:*:*:* |
|
References | (MISC) https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/05/README.md - Exploit, Third Party Advisory | |
CWE | CWE-787 | |
First Time |
Trendnet tew-820ap
Trendnet tew-820ap Firmware Trendnet |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
23 Jan 2023, 17:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-01-23 15:15
Updated : 2024-05-17 02:20
NVD link : CVE-2023-24095
Mitre link : CVE-2023-24095
CVE.ORG link : CVE-2023-24095
JSON object : View
Products Affected
trendnet
- tew-820ap_firmware
- tew-820ap
CWE
CWE-787
Out-of-bounds Write