CVE-2020-14079
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
15/06/2020
Last modified:
17/06/2020
Description
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action auto_up_fw (or auto_up_lp) with a sufficiently long update_file_name key.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:trendnet:tew-827dru_firmware:*:*:*:*:*:*:*:* | 2.06b04 (including) | |
| cpe:2.3:h:trendnet:tew-827dru:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/kuc001/IoTFirmware/blob/master/Trendnet/TEW-827/TRENDnet-auto_up_fw.pdf
- https://github.com/kuc001/IoTFirmware/blob/master/Trendnet/TEW-827/TRENDnet-auto_up_lp.pdf
- https://github.com/kuc001/IoTFirmware/blob/master/Trendnet/TEW-827/auto_up_fw_overflow.pdf
- https://github.com/kuc001/IoTFirmware/blob/master/Trendnet/TEW-827/auto_up_lp_overflow.pdf



