Lucene search

K
nvd[email protected]NVD:CVE-2023-24099
HistoryJan 23, 2023 - 3:15 p.m.

CVE-2023-24099

2023-01-2315:15:18
CWE-787
web.nvd.nist.gov
4
trendnet
tew-820ap
firmware
stack overflow
vulnerability
arbitrary code
payload
unsupported maintenance

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

46.0%

TrendNet Wireless AC Easy-Upgrader TEW-820AP v1.0R, firmware version 1.01.B01 was discovered to contain a stack overflow via the username parameter at /formWizardPassword. This vulnerability allows attackers to execute arbitrary code via a crafted payload. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

Affected configurations

Nvd
Node
trendnettew-820ap_firmwareMatch1.01.b01
AND
trendnettew-820apMatch1.0r
VendorProductVersionCPE
trendnettew-820ap_firmware1.01.b01cpe:2.3:o:trendnet:tew-820ap_firmware:1.01.b01:*:*:*:*:*:*:*
trendnettew-820ap1.0rcpe:2.3:h:trendnet:tew-820ap:1.0r:*:*:*:*:*:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

46.0%

Related for NVD:CVE-2023-24099