Lucene search

K
cveVulDBCVE-2024-0918
HistoryJan 26, 2024 - 9:15 a.m.

CVE-2024-0918

2024-01-2609:15:07
CWE-78
VulDB
web.nvd.nist.gov
18
cve-2024-0918
trendnet
tew-800mb
vulnerability
critical
remote
command injection
exploit
disclosure
vdb-252122

CVSS2

8.3

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

MULTIPLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:M/C:C/I:C/A:C

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.4

Confidence

High

EPSS

0.001

Percentile

31.6%

A vulnerability was found in TRENDnet TEW-800MB 1.0.1.0 and classified as critical. Affected by this issue is some unknown functionality of the component POST Request Handler. The manipulation of the argument DeviceURL leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252122 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Affected configurations

Nvd
Vulners
Vulnrichment
Node
trendnettew-800mb_firmwareMatch1.0.1.0
AND
trendnettew-800mbMatch-
VendorProductVersionCPE
trendnettew-800mb_firmware1.0.1.0cpe:2.3:o:trendnet:tew-800mb_firmware:1.0.1.0:*:*:*:*:*:*:*
trendnettew-800mb-cpe:2.3:h:trendnet:tew-800mb:-:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "TRENDnet",
    "product": "TEW-800MB",
    "versions": [
      {
        "version": "1.0.1.0",
        "status": "affected"
      }
    ],
    "modules": [
      "POST Request Handler"
    ]
  }
]

CVSS2

8.3

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

MULTIPLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:M/C:C/I:C/A:C

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.4

Confidence

High

EPSS

0.001

Percentile

31.6%

Related for CVE-2024-0918