Lucene search

K
cveMitreCVE-2023-24099
HistoryJan 23, 2023 - 3:15 p.m.

CVE-2023-24099

2023-01-2315:15:18
CWE-787
mitre
web.nvd.nist.gov
22
trendnet
wireless ac
easy-upgrader
tew-820ap
cve-2023-24099
stack overflow
firmware vulnerability
arbitrary code execution
end of support

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

46.0%

TrendNet Wireless AC Easy-Upgrader TEW-820AP v1.0R, firmware version 1.01.B01 was discovered to contain a stack overflow via the username parameter at /formWizardPassword. This vulnerability allows attackers to execute arbitrary code via a crafted payload. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

Affected configurations

Nvd
Node
trendnettew-820ap_firmwareMatch1.01.b01
AND
trendnettew-820apMatch1.0r
VendorProductVersionCPE
trendnettew-820ap_firmware1.01.b01cpe:2.3:o:trendnet:tew-820ap_firmware:1.01.b01:*:*:*:*:*:*:*
trendnettew-820ap1.0rcpe:2.3:h:trendnet:tew-820ap:1.0r:*:*:*:*:*:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

46.0%

Related for CVE-2023-24099