Vulnerabilites related to TRENDnet - TV-IP110WN
var-202206-1635
Vulnerability from variot
Trendnet IP-110wn camera fw_tv-ip110wn_v2(1.2.2.68) has an xss vulnerability via the proname parameter in /admin/scheprofile.cgi. TRENDnet of TV-IP110WN Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. Trendnet IP-110wn is a wireless network camera from Trendnet Company. The vulnerability is caused by the lack of the proname parameter in /admin/scheprofile.cgi, which lacks the data validation filter for user-supplied data and output data. An attacker could exploit this vulnerability to execute JavaScript code on the client side
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-1635", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tv-ip110wn", "scope": "eq", "trust": 1.0, "vendor": "trendnet", "version": "1.2.2.68" }, { "model": "tv-ip110wn", "scope": null, "trust": 0.8, "vendor": "trendnet", "version": null }, { "model": "tv-ip110wn", "scope": "eq", "trust": 0.8, "vendor": "trendnet", "version": null }, { "model": "tv-ip110wn", "scope": "eq", "trust": 0.8, "vendor": "trendnet", "version": "tv-ip110wn firmware 1.2.2.68" }, { "model": "ip-110wn", "scope": "eq", "trust": 0.6, "vendor": "trendnet", "version": "1.2.2.68" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-68509" }, { "db": "JVNDB", "id": "JVNDB-2022-012240" }, { "db": "NVD", "id": "CVE-2022-31875" } ] }, "cve": "CVE-2022-31875", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2022-31875", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2022-68509", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2022-31875", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2022-31875", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-31875", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-31875", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2022-68509", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-1720", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-31875", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-68509" }, { "db": "VULMON", "id": "CVE-2022-31875" }, { "db": "JVNDB", "id": "JVNDB-2022-012240" }, { "db": "CNNVD", "id": "CNNVD-202206-1720" }, { "db": "NVD", "id": "CVE-2022-31875" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Trendnet IP-110wn camera fw_tv-ip110wn_v2(1.2.2.68) has an xss vulnerability via the proname parameter in /admin/scheprofile.cgi. TRENDnet of TV-IP110WN Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. Trendnet IP-110wn is a wireless network camera from Trendnet Company. The vulnerability is caused by the lack of the proname parameter in /admin/scheprofile.cgi, which lacks the data validation filter for user-supplied data and output data. An attacker could exploit this vulnerability to execute JavaScript code on the client side", "sources": [ { "db": "NVD", "id": "CVE-2022-31875" }, { "db": "JVNDB", "id": "JVNDB-2022-012240" }, { "db": "CNVD", "id": "CNVD-2022-68509" }, { "db": "VULMON", "id": "CVE-2022-31875" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31875", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2022-012240", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-68509", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202206-1720", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-31875", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-68509" }, { "db": "VULMON", "id": "CVE-2022-31875" }, { "db": "JVNDB", "id": "JVNDB-2022-012240" }, { "db": "CNNVD", "id": "CNNVD-202206-1720" }, { "db": "NVD", "id": "CVE-2022-31875" } ] }, "id": "VAR-202206-1635", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-68509" } ], "trust": 1.361904775 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-68509" } ] }, "last_update_date": "2024-11-23T21:58:18.874000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.0 }, { "problemtype": "Cross-site scripting (CWE-79) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012240" }, { "db": "NVD", "id": "CVE-2022-31875" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://github.com/jayus0821/uai-poc/blob/main/trendnet/ip-110wn/xss1.md" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31875" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31875/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/79.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-68509" }, { "db": "VULMON", "id": "CVE-2022-31875" }, { "db": "JVNDB", "id": "JVNDB-2022-012240" }, { "db": "CNNVD", "id": "CNNVD-202206-1720" }, { "db": "NVD", "id": "CVE-2022-31875" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-68509" }, { "db": "VULMON", "id": "CVE-2022-31875" }, { "db": "JVNDB", "id": "JVNDB-2022-012240" }, { "db": "CNNVD", "id": "CNNVD-202206-1720" }, { "db": "NVD", "id": "CVE-2022-31875" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-08T00:00:00", "db": "CNVD", "id": "CNVD-2022-68509" }, { "date": "2022-06-17T00:00:00", "db": "VULMON", "id": "CVE-2022-31875" }, { "date": "2023-08-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-012240" }, { "date": "2022-06-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-1720" }, { "date": "2022-06-17T20:15:10.867000", "db": "NVD", "id": "CVE-2022-31875" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-13T00:00:00", "db": "CNVD", "id": "CNVD-2022-68509" }, { "date": "2022-06-28T00:00:00", "db": "VULMON", "id": "CVE-2022-31875" }, { "date": "2023-08-28T08:06:00", "db": "JVNDB", "id": "JVNDB-2022-012240" }, { "date": "2022-07-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-1720" }, { "date": "2024-11-21T07:05:25.060000", "db": "NVD", "id": "CVE-2022-31875" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1720" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "TRENDnet\u00a0 of \u00a0TV-IP110WN\u00a0 Cross-site scripting vulnerability in firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012240" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1720" } ], "trust": 0.6 } }
var-201904-0921
Vulnerability from variot
system.cgi on TRENDnet TV-IP110WN cameras has a buffer overflow caused by an inadequate source-length check before a strcpy operation in the respondAsp function. Attackers can exploit the vulnerability by using the languse parameter with a long string. This affects 1.2.2 build 28, 64, 65, and 68. TRENDnet TV-IP110WN The camera contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. TRENDnetTV-IP110WN is a wireless webcam from TRENDnet. A buffer overflow vulnerability exists in the system.cgi file in TRENDnetTV-IP110WN. This vulnerability is caused by a network system or product performing an operation on memory that does not properly validate data boundaries, causing incorrect read and write to other associated memory locations. operating. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow. write operation
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201904-0921", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tv-ip110wn", "scope": "eq", "trust": 1.0, "vendor": "trendnet", "version": "1.2.2.28" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 1.0, "vendor": "trendnet", "version": "1.2.2.64" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 1.0, "vendor": "trendnet", "version": "1.2.2.65" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 1.0, "vendor": "trendnet", "version": "1.2.2.68" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 0.8, "vendor": "trendnet", "version": "1.2.2 build 28" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 0.8, "vendor": "trendnet", "version": "1.2.2 build 64" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 0.8, "vendor": "trendnet", "version": "1.2.2 build 65" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 0.8, "vendor": "trendnet", "version": "1.2.2 build 68" }, { "model": "tv-ip110wn build", "scope": "eq", "trust": 0.6, "vendor": "trendnet", "version": "1.2.228" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 0.6, "vendor": "trendnet", "version": "64" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 0.6, "vendor": "trendnet", "version": "65" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 0.6, "vendor": "trendnet", "version": "68" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-16064" }, { "db": "JVNDB", "id": "JVNDB-2019-003817" }, { "db": "NVD", "id": "CVE-2019-11417" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:trendnet:tv-ip110wn_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003817" } ] }, "cve": "CVE-2019-11417", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-11417", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-16064", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-143061", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-11417", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-11417", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2019-11417", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2019-16064", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201904-1017", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-143061", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-11417", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-16064" }, { "db": "VULHUB", "id": "VHN-143061" }, { "db": "VULMON", "id": "CVE-2019-11417" }, { "db": "JVNDB", "id": "JVNDB-2019-003817" }, { "db": "CNNVD", "id": "CNNVD-201904-1017" }, { "db": "NVD", "id": "CVE-2019-11417" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "system.cgi on TRENDnet TV-IP110WN cameras has a buffer overflow caused by an inadequate source-length check before a strcpy operation in the respondAsp function. Attackers can exploit the vulnerability by using the languse parameter with a long string. This affects 1.2.2 build 28, 64, 65, and 68. TRENDnet TV-IP110WN The camera contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. TRENDnetTV-IP110WN is a wireless webcam from TRENDnet. A buffer overflow vulnerability exists in the system.cgi file in TRENDnetTV-IP110WN. This vulnerability is caused by a network system or product performing an operation on memory that does not properly validate data boundaries, causing incorrect read and write to other associated memory locations. operating. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow. write operation", "sources": [ { "db": "NVD", "id": "CVE-2019-11417" }, { "db": "JVNDB", "id": "JVNDB-2019-003817" }, { "db": "CNVD", "id": "CNVD-2019-16064" }, { "db": "VULHUB", "id": "VHN-143061" }, { "db": "VULMON", "id": "CVE-2019-11417" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-11417", "trust": 3.2 }, { "db": "JVNDB", "id": "JVNDB-2019-003817", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201904-1017", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2019-16064", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-143061", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-11417", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-16064" }, { "db": "VULHUB", "id": "VHN-143061" }, { "db": "VULMON", "id": "CVE-2019-11417" }, { "db": "JVNDB", "id": "JVNDB-2019-003817" }, { "db": "CNNVD", "id": "CNNVD-201904-1017" }, { "db": "NVD", "id": "CVE-2019-11417" } ] }, "id": "VAR-201904-0921", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-16064" }, { "db": "VULHUB", "id": "VHN-143061" } ], "trust": 1.22380955 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-16064" } ] }, "last_update_date": "2024-11-23T22:17:04.977000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.trendnet.com/home" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003817" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 1.0 }, { "problemtype": "CWE-119", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-143061" }, { "db": "JVNDB", "id": "JVNDB-2019-003817" }, { "db": "NVD", "id": "CVE-2019-11417" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://github.com/zyw-200/iotfuzzer/blob/master/trendnet_response.png" }, { "trust": 1.4, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11417" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11417" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-16064" }, { "db": "VULHUB", "id": "VHN-143061" }, { "db": "VULMON", "id": "CVE-2019-11417" }, { "db": "JVNDB", "id": "JVNDB-2019-003817" }, { "db": "CNNVD", "id": "CNNVD-201904-1017" }, { "db": "NVD", "id": "CVE-2019-11417" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-16064" }, { "db": "VULHUB", "id": "VHN-143061" }, { "db": "VULMON", "id": "CVE-2019-11417" }, { "db": "JVNDB", "id": "JVNDB-2019-003817" }, { "db": "CNNVD", "id": "CNNVD-201904-1017" }, { "db": "NVD", "id": "CVE-2019-11417" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-05-30T00:00:00", "db": "CNVD", "id": "CNVD-2019-16064" }, { "date": "2019-04-22T00:00:00", "db": "VULHUB", "id": "VHN-143061" }, { "date": "2019-04-22T00:00:00", "db": "VULMON", "id": "CVE-2019-11417" }, { "date": "2019-05-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003817" }, { "date": "2019-04-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-1017" }, { "date": "2019-04-22T11:29:05.517000", "db": "NVD", "id": "CVE-2019-11417" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-05-30T00:00:00", "db": "CNVD", "id": "CNVD-2019-16064" }, { "date": "2019-04-23T00:00:00", "db": "VULHUB", "id": "VHN-143061" }, { "date": "2021-07-21T00:00:00", "db": "VULMON", "id": "CVE-2019-11417" }, { "date": "2019-05-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003817" }, { "date": "2019-04-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-1017" }, { "date": "2024-11-21T04:21:04.480000", "db": "NVD", "id": "CVE-2019-11417" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-1017" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "TRENDnet TV-IP110WN Buffer error vulnerability in camera", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003817" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-1017" } ], "trust": 0.6 } }
var-202108-0942
Vulnerability from variot
Cross Site Scripting (XSS) vulnerability in TRENDnet TV-IP110WN V1.2.2.64 V1.2.2.65 V1.2.2.68 via the profile parameter. in a GET request in view.cgi. TRENDnet TV-IP110WN Contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0942", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tv-ip110wn", "scope": "eq", "trust": 1.0, "vendor": "trendnet", "version": "1.2.2.68" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 1.0, "vendor": "trendnet", "version": "1.2.2.65" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 1.0, "vendor": "trendnet", "version": "1.2.2.64" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 0.8, "vendor": "trendnet", "version": "tv-ip110wn firmware 1.2.2.65" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 0.8, "vendor": "trendnet", "version": "tv-ip110wn firmware 1.2.2.64" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 0.8, "vendor": "trendnet", "version": "tv-ip110wn firmware 1.2.2.68" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 0.8, "vendor": "trendnet", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009679" }, { "db": "NVD", "id": "CVE-2021-31655" } ] }, "cve": "CVE-2021-31655", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2021-31655", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2021-31655", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-31655", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-31655", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-31655", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202108-976", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-31655", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-31655" }, { "db": "JVNDB", "id": "JVNDB-2021-009679" }, { "db": "CNNVD", "id": "CNNVD-202108-976" }, { "db": "NVD", "id": "CVE-2021-31655" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross Site Scripting (XSS) vulnerability in TRENDnet TV-IP110WN V1.2.2.64 V1.2.2.65 V1.2.2.68 via the profile parameter. in a GET request in view.cgi. TRENDnet TV-IP110WN Contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-31655" }, { "db": "JVNDB", "id": "JVNDB-2021-009679" }, { "db": "VULMON", "id": "CVE-2021-31655" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-31655", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-009679", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-976", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2021-31655", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-31655" }, { "db": "JVNDB", "id": "JVNDB-2021-009679" }, { "db": "CNNVD", "id": "CNNVD-202108-976" }, { "db": "NVD", "id": "CVE-2021-31655" } ] }, "id": "VAR-202108-0942", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.52380955 }, "last_update_date": "2024-08-14T15:22:11.592000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top\u00a0Page", "trust": 0.8, "url": "https://www.trendnet.com/" }, { "title": "CVE-2021-31655", "trust": 0.1, "url": "https://github.com/yinfeidi/CVE-2021-31655 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-31655" }, { "db": "JVNDB", "id": "JVNDB-2021-009679" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.0 }, { "problemtype": "Cross-site scripting (CWE-79) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009679" }, { "db": "NVD", "id": "CVE-2021-31655" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://github.com/yinfeidi/vuls/blob/main/trendnet%20tv-ip110wn/cve-2021-31655.md" }, { "trust": 1.7, "url": "http://tv-ip110wn.com" }, { "trust": 1.7, "url": "http://trendnet.com" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-31655" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/79.html" }, { "trust": 0.1, "url": "https://github.com/yinfeidi/cve-2021-31655" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-31655" }, { "db": "JVNDB", "id": "JVNDB-2021-009679" }, { "db": "CNNVD", "id": "CNNVD-202108-976" }, { "db": "NVD", "id": "CVE-2021-31655" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2021-31655" }, { "db": "JVNDB", "id": "JVNDB-2021-009679" }, { "db": "CNNVD", "id": "CNNVD-202108-976" }, { "db": "NVD", "id": "CVE-2021-31655" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-10T00:00:00", "db": "VULMON", "id": "CVE-2021-31655" }, { "date": "2022-05-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009679" }, { "date": "2021-08-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-976" }, { "date": "2021-08-10T13:15:06.907000", "db": "NVD", "id": "CVE-2021-31655" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-16T00:00:00", "db": "VULMON", "id": "CVE-2021-31655" }, { "date": "2022-05-17T07:09:00", "db": "JVNDB", "id": "JVNDB-2021-009679" }, { "date": "2022-03-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-976" }, { "date": "2021-08-16T19:13:27.460000", "db": "NVD", "id": "CVE-2021-31655" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-976" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "TRENDnet\u00a0TV-IP110WN\u00a0 Cross-site Scripting Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009679" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-976" } ], "trust": 0.6 } }
var-201812-0908
Vulnerability from variot
Buffer overflow in video.cgi on TRENDnet TV-IP110WN V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64 and TV-IP121WN V1.2.2 build 28 devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (without authentication). TRENDnet TV-IP110WN and TV-IP121WN The device contains a buffer error vulnerability.Information may be tampered with. TRENDnetTV-IP110WN is a wireless internet surveillance camera. The TRENDnetTV-IP121WN is a network camera solution for surveillance. There are BoF vulnerabilities in TRENDnetTV-IP110WN and TV-IP121WN. An attacker could use a POST request to deliver its payload to trigger a BoF vulnerability in the \"url\" parameter without authentication. ########################################### Vulnerabilities found in TRENDnet devices
Authors:Prashast Srivastava, Mathias Payer Howard Shrobe, Hamed Okhravi
Author contact: https://github.com/prashast/
Multiple vulnerabilties including Command Injection, Buffer Overflow and Reflective XSS vulnerabilties were found in the following TRENDnet devices: Routers: TEW-634GRU, TEW-673GRU, TEW-632BRP IP-Cameras: TV-IP110WN, TV-IP121WN These were found using our dynamic analysis tool for embedded devices. The POC's will be made available upon the public release of our tool. A more detailed breakdown is presented below on a per vulnerability basis:-
Command Injection
CVE-ID: CVE-2018-19239
Product: TEW-673GRU
Module affected: start_arpping
function in timer
binary
Firmware version: v1.00b40
TRENDnet TEW-673GRU v1.00b40 devices have an OS command injection
vulnerability in the start_arpping
function of the
timer binary
, which allows remote attackers to execute
arbitrary commands via three parameters (dhcpd_start, dhcpd_end, and
lan_ipaddr)
passed to the apply.cgi binary through a POST request. Exploiting the
vulnerability
requires a user to be authenticated with the router with
administrative credentials.
The start_arpping
function reads the following values from the NVRAM
namely: dhcpd_start,
dhcpd_end, lan_ipaddr, lan_bridge and lan_eth. These values are then
passed to the
arpping
utility without any sort of sanity checks.
Out of these values, the outward facing configuration webserver(httpd)
running at
IP:192.168.10.1 Port: 80
allows a user to modify the first three
values dhcpd_start
,
dhcpd_end
, lan_ipaddr
via the LAN and DHCP server configuration
webpage available at
http://192.168.10.1/lan.asp
by making a POST request to apply.cgi
binary with the
appropriate parameters.
We have observed that the by directly making a POST request to the
apply.cgi
binary
with the values of the above mentioned three parameters containing
Command Injection
based payloads, it is possible to execute arbitrary commands on the
router with root
privileges. A sub-routine respondAsp is called that
copies a user-controlled parameter into a stack variable using strcpy
without any
bounds check.
Reflective XSS
Products: - TEW-632BRP (1.010B32) - TEW-673GRU (v1.00b40) - TEW-634GRU (v1.01B14)
Module affected: login.cgi
Login.cgi
in TRENDNet TEW-632BRP, TEW-673GRU and TEW-634GRU has a
reflected XSS
vulnerability that does not require any authentication.
Vendor Disclosure
The vulnerabilities had been notified to the vendor 12/03. The vendor replied on 12/05 that since the products had reached their end-of-life no future development or firmware updates would be provided for these devices
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201812-0908", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tv-ip110wn", "scope": "eq", "trust": 2.4, "vendor": "trendnet", "version": "1.2.2.65" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 1.6, "vendor": "trendnet", "version": "1.2.2.64" }, { "model": "tv-ip121wn", "scope": "eq", "trust": 1.6, "vendor": "trendnet", "version": "1.2.2.28" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 1.6, "vendor": "trendnet", "version": "1.2.2.68" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 0.8, "vendor": "trendnet", "version": "1.2.2 build 64" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 0.8, "vendor": "trendnet", "version": "1.2.2 build 68" }, { "model": "tv-ip121wn", "scope": "eq", "trust": 0.8, "vendor": "trendnet", "version": "1.2.2 build 28" }, { "model": "tv-ip121wn build", "scope": "eq", "trust": 0.6, "vendor": "trendnet", "version": "v1.2.228" }, { "model": "tv-ip110wn build", "scope": "eq", "trust": 0.6, "vendor": "trendnet", "version": "v1.2.268" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 0.6, "vendor": "trendnet", "version": "v1.2.2.65" }, { "model": "tv-ip110wn build", "scope": "eq", "trust": 0.6, "vendor": "trendnet", "version": "v1.2.264" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-25693" }, { "db": "JVNDB", "id": "JVNDB-2018-013457" }, { "db": "CNNVD", "id": "CNNVD-201812-974" }, { "db": "NVD", "id": "CVE-2018-19241" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:trendnet:tv-ip110wn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:trendnet:tv-ip121wn_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013457" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mathias Payer, Hamed Okhravi, Prashast Srivastava, Howard Shrobe", "sources": [ { "db": "PACKETSTORM", "id": "150693" } ], "trust": 0.1 }, "cve": "CVE-2018-19241", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2018-19241", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2018-25693", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2018-19241", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-19241", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-19241", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2018-25693", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201812-974", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-25693" }, { "db": "JVNDB", "id": "JVNDB-2018-013457" }, { "db": "CNNVD", "id": "CNNVD-201812-974" }, { "db": "NVD", "id": "CVE-2018-19241" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in video.cgi on TRENDnet TV-IP110WN V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64 and TV-IP121WN V1.2.2 build 28 devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (without authentication). TRENDnet TV-IP110WN and TV-IP121WN The device contains a buffer error vulnerability.Information may be tampered with. TRENDnetTV-IP110WN is a wireless internet surveillance camera. The TRENDnetTV-IP121WN is a network camera solution for surveillance. There are BoF vulnerabilities in TRENDnetTV-IP110WN and TV-IP121WN. An attacker could use a POST request to deliver its payload to trigger a BoF vulnerability in the \\\"url\\\" parameter without authentication. ###########################################\nVulnerabilities found in TRENDnet devices\n\nAuthors:Prashast Srivastava, Mathias Payer\n Howard Shrobe, Hamed Okhravi\n\nAuthor contact: https://github.com/prashast/\n\n###########################################\n\nMultiple vulnerabilties including Command Injection, Buffer Overflow and\nReflective XSS vulnerabilties were found in the following TRENDnet devices:\nRouters: TEW-634GRU, TEW-673GRU, TEW-632BRP\nIP-Cameras: TV-IP110WN, TV-IP121WN\nThese were found using our dynamic analysis tool for embedded devices. \nThe POC\u0027s will be made available upon the public\nrelease of our tool. A more detailed breakdown is presented\nbelow on a per vulnerability basis:-\n\nCommand Injection\n------------------\n\nCVE-ID: CVE-2018-19239\nProduct: TEW-673GRU\nModule affected: `start_arpping` function in `timer` binary\nFirmware version: v1.00b40\n\nTRENDnet TEW-673GRU v1.00b40 devices have an OS command injection\nvulnerability in the `start_arpping` function of the\n`timer binary`, which allows remote attackers to execute\narbitrary commands via three parameters (dhcpd_start, dhcpd_end, and\nlan_ipaddr)\npassed to the apply.cgi binary through a POST request. Exploiting the\nvulnerability\nrequires a user to be authenticated with the router with\nadministrative credentials. \n\nThe `start_arpping` function reads the following values from the NVRAM\nnamely: dhcpd_start,\ndhcpd_end, lan_ipaddr, lan_bridge and lan_eth. These values are then\npassed to the\n`arpping` utility without any sort of sanity checks. \nOut of these values, the outward facing configuration webserver(httpd)\nrunning at\n`IP:192.168.10.1 Port: 80` allows a user to modify the first three\nvalues `dhcpd_start`,\n`dhcpd_end`, `lan_ipaddr` via the LAN and DHCP server configuration\nwebpage available at\n`http://192.168.10.1/lan.asp` by making a POST request to `apply.cgi`\nbinary with the\nappropriate parameters. \n\nWe have observed that the by directly making a POST request to the\n`apply.cgi` binary\nwith the values of the above mentioned three parameters containing\nCommand Injection\nbased payloads, it is possible to execute arbitrary commands on the\nrouter with root\nprivileges. A sub-routine respondAsp is called that\ncopies a user-controlled parameter into a stack variable using strcpy\nwithout any\nbounds check. \n\n\nReflective XSS\n---------------\n\nProducts:\n- TEW-632BRP (1.010B32)\n- TEW-673GRU (v1.00b40)\n- TEW-634GRU (v1.01B14)\n\nModule affected: `login.cgi`\n\n`Login.cgi` in TRENDNet TEW-632BRP, TEW-673GRU and TEW-634GRU has a\nreflected XSS\nvulnerability that does not require any authentication. \n\nVendor Disclosure\n------------------\n\nThe vulnerabilities had been notified to the vendor 12/03. \nThe vendor replied on 12/05 that since the products had reached their\nend-of-life no future development or firmware updates\nwould be provided for these devices", "sources": [ { "db": "NVD", "id": "CVE-2018-19241" }, { "db": "JVNDB", "id": "JVNDB-2018-013457" }, { "db": "CNVD", "id": "CNVD-2018-25693" }, { "db": "PACKETSTORM", "id": "150693" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-19241", "trust": 3.1 }, { "db": "PACKETSTORM", "id": "150693", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2018-013457", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2018-25693", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201812-974", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-25693" }, { "db": "JVNDB", "id": "JVNDB-2018-013457" }, { "db": "PACKETSTORM", "id": "150693" }, { "db": "CNNVD", "id": "CNNVD-201812-974" }, { "db": "NVD", "id": "CVE-2018-19241" } ] }, "id": "VAR-201812-0908", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-25693" } ], "trust": 1.186904775 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-25693" } ] }, "last_update_date": "2024-11-23T21:37:54.188000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.trendnet.com/home" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013457" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013457" }, { "db": "NVD", "id": "CVE-2018-19241" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://packetstormsecurity.com/files/150693/trendnet-command-injection-buffer-overflow-cross-site-scripting.html" }, { "trust": 2.2, "url": "http://seclists.org/fulldisclosure/2018/dec/21" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19241" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19241" }, { "trust": 0.1, "url": "https://github.com/prashast/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19242" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19239" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19240" }, { "trust": 0.1, "url": "http://192.168.10.1/lan.asp`" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-25693" }, { "db": "JVNDB", "id": "JVNDB-2018-013457" }, { "db": "PACKETSTORM", "id": "150693" }, { "db": "CNNVD", "id": "CNNVD-201812-974" }, { "db": "NVD", "id": "CVE-2018-19241" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-25693" }, { "db": "JVNDB", "id": "JVNDB-2018-013457" }, { "db": "PACKETSTORM", "id": "150693" }, { "db": "CNNVD", "id": "CNNVD-201812-974" }, { "db": "NVD", "id": "CVE-2018-19241" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-12-18T00:00:00", "db": "CNVD", "id": "CNVD-2018-25693" }, { "date": "2019-02-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013457" }, { "date": "2018-12-09T23:22:22", "db": "PACKETSTORM", "id": "150693" }, { "date": "2018-12-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201812-974" }, { "date": "2018-12-20T23:29:01.190000", "db": "NVD", "id": "CVE-2018-19241" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-12-18T00:00:00", "db": "CNVD", "id": "CNVD-2018-25693" }, { "date": "2019-02-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013457" }, { "date": "2018-12-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201812-974" }, { "date": "2024-11-21T03:57:37.843000", "db": "NVD", "id": "CVE-2018-19241" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201812-974" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "TRENDnet TV-IP110WN and TV-IP121WN Device buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013457" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201812-974" } ], "trust": 0.6 } }
var-201812-0907
Vulnerability from variot
Buffer overflow in network.cgi on TRENDnet TV-IP110WN V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64 and TV-IP121WN V1.2.2 build 28 devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (without authentication). TRENDnet TV-IP110WN and TV-IP121WN The device contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. TRENDnetTV-IP110WN is a wireless internet surveillance camera. The TRENDnetTV-IP121WN is a network camera solution for surveillance. A buffer overflow vulnerability exists in TRENDnetTV-IP110WN and TV-IP121WN. ########################################### Vulnerabilities found in TRENDnet devices
Authors:Prashast Srivastava, Mathias Payer Howard Shrobe, Hamed Okhravi
Author contact: https://github.com/prashast/
Multiple vulnerabilties including Command Injection, Buffer Overflow and Reflective XSS vulnerabilties were found in the following TRENDnet devices: Routers: TEW-634GRU, TEW-673GRU, TEW-632BRP IP-Cameras: TV-IP110WN, TV-IP121WN These were found using our dynamic analysis tool for embedded devices. The POC's will be made available upon the public release of our tool. A more detailed breakdown is presented below on a per vulnerability basis:-
Command Injection
CVE-ID: CVE-2018-19239
Product: TEW-673GRU
Module affected: start_arpping
function in timer
binary
Firmware version: v1.00b40
TRENDnet TEW-673GRU v1.00b40 devices have an OS command injection
vulnerability in the start_arpping
function of the
timer binary
, which allows remote attackers to execute
arbitrary commands via three parameters (dhcpd_start, dhcpd_end, and
lan_ipaddr)
passed to the apply.cgi binary through a POST request. Exploiting the
vulnerability
requires a user to be authenticated with the router with
administrative credentials.
The start_arpping
function reads the following values from the NVRAM
namely: dhcpd_start,
dhcpd_end, lan_ipaddr, lan_bridge and lan_eth. These values are then
passed to the
arpping
utility without any sort of sanity checks.
Out of these values, the outward facing configuration webserver(httpd)
running at
IP:192.168.10.1 Port: 80
allows a user to modify the first three
values dhcpd_start
,
dhcpd_end
, lan_ipaddr
via the LAN and DHCP server configuration
webpage available at
http://192.168.10.1/lan.asp
by making a POST request to apply.cgi
binary with the
appropriate parameters.
We have observed that the by directly making a POST request to the
apply.cgi
binary
with the values of the above mentioned three parameters containing
Command Injection
based payloads, it is possible to execute arbitrary commands on the
router with root
privileges. A sub-routine respondAsp is called that
copies a user-controlled parameter into a stack variable using strcpy
without any
bounds check. This makes the subroutine vulnerable to BoF and can be exploited
without authentication
x-----------x
Products:
- TV-IP110WN (V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64)
- TV-IP121WN (V1.2.2 build 28)
Module affected: watch.cgi
A BoF vulnerability exists in the watch.cgi
binary and how it handles
the url
parameter. An attacker can deliver its payload using a POST request
in the url
parameter to trigger the BoF vulnerability without authentication.
Reflective XSS
Products: - TEW-632BRP (1.010B32) - TEW-673GRU (v1.00b40) - TEW-634GRU (v1.01B14)
Module affected: login.cgi
Login.cgi
in TRENDNet TEW-632BRP, TEW-673GRU and TEW-634GRU has a
reflected XSS
vulnerability that does not require any authentication.
Vendor Disclosure
The vulnerabilities had been notified to the vendor 12/03. The vendor replied on 12/05 that since the products had reached their end-of-life no future development or firmware updates would be provided for these devices
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201812-0907", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tv-ip110wn", "scope": "eq", "trust": 2.4, "vendor": "trendnet", "version": "1.2.2.65" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 1.6, "vendor": "trendnet", "version": "1.2.2.64" }, { "model": "tv-ip121wn", "scope": "eq", "trust": 1.6, "vendor": "trendnet", "version": "1.2.2.28" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 1.6, "vendor": "trendnet", "version": "1.2.2.68" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 0.8, "vendor": "trendnet", "version": "1.2.2 build 64" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 0.8, "vendor": "trendnet", "version": "1.2.2 build 68" }, { "model": "tv-ip121wn", "scope": "eq", "trust": 0.8, "vendor": "trendnet", "version": "1.2.2 build 28" }, { "model": "tv-ip121wn build", "scope": "eq", "trust": 0.6, "vendor": "trendnet", "version": "v1.2.228" }, { "model": "tv-ip110wn build", "scope": "eq", "trust": 0.6, "vendor": "trendnet", "version": "v1.2.268" }, { "model": "tv-ip110wn", "scope": "eq", "trust": 0.6, "vendor": "trendnet", "version": "v1.2.2.65" }, { "model": "tv-ip110wn build", "scope": "eq", "trust": 0.6, "vendor": "trendnet", "version": "v1.2.264" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-25690" }, { "db": "JVNDB", "id": "JVNDB-2018-013456" }, { "db": "CNNVD", "id": "CNNVD-201812-973" }, { "db": "NVD", "id": "CVE-2018-19240" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:trendnet:tv-ip110wn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:trendnet:tv-ip121wn_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013456" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mathias Payer, Hamed Okhravi, Prashast Srivastava, Howard Shrobe", "sources": [ { "db": "PACKETSTORM", "id": "150693" } ], "trust": 0.1 }, "cve": "CVE-2018-19240", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2018-19240", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2018-25690", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2018-19240", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-19240", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2018-19240", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2018-25690", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201812-973", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-25690" }, { "db": "JVNDB", "id": "JVNDB-2018-013456" }, { "db": "CNNVD", "id": "CNNVD-201812-973" }, { "db": "NVD", "id": "CVE-2018-19240" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in network.cgi on TRENDnet TV-IP110WN V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64 and TV-IP121WN V1.2.2 build 28 devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (without authentication). TRENDnet TV-IP110WN and TV-IP121WN The device contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. TRENDnetTV-IP110WN is a wireless internet surveillance camera. The TRENDnetTV-IP121WN is a network camera solution for surveillance. A buffer overflow vulnerability exists in TRENDnetTV-IP110WN and TV-IP121WN. ###########################################\nVulnerabilities found in TRENDnet devices\n\nAuthors:Prashast Srivastava, Mathias Payer\n Howard Shrobe, Hamed Okhravi\n\nAuthor contact: https://github.com/prashast/\n\n###########################################\n\nMultiple vulnerabilties including Command Injection, Buffer Overflow and\nReflective XSS vulnerabilties were found in the following TRENDnet devices:\nRouters: TEW-634GRU, TEW-673GRU, TEW-632BRP\nIP-Cameras: TV-IP110WN, TV-IP121WN\nThese were found using our dynamic analysis tool for embedded devices. \nThe POC\u0027s will be made available upon the public\nrelease of our tool. A more detailed breakdown is presented\nbelow on a per vulnerability basis:-\n\nCommand Injection\n------------------\n\nCVE-ID: CVE-2018-19239\nProduct: TEW-673GRU\nModule affected: `start_arpping` function in `timer` binary\nFirmware version: v1.00b40\n\nTRENDnet TEW-673GRU v1.00b40 devices have an OS command injection\nvulnerability in the `start_arpping` function of the\n`timer binary`, which allows remote attackers to execute\narbitrary commands via three parameters (dhcpd_start, dhcpd_end, and\nlan_ipaddr)\npassed to the apply.cgi binary through a POST request. Exploiting the\nvulnerability\nrequires a user to be authenticated with the router with\nadministrative credentials. \n\nThe `start_arpping` function reads the following values from the NVRAM\nnamely: dhcpd_start,\ndhcpd_end, lan_ipaddr, lan_bridge and lan_eth. These values are then\npassed to the\n`arpping` utility without any sort of sanity checks. \nOut of these values, the outward facing configuration webserver(httpd)\nrunning at\n`IP:192.168.10.1 Port: 80` allows a user to modify the first three\nvalues `dhcpd_start`,\n`dhcpd_end`, `lan_ipaddr` via the LAN and DHCP server configuration\nwebpage available at\n`http://192.168.10.1/lan.asp` by making a POST request to `apply.cgi`\nbinary with the\nappropriate parameters. \n\nWe have observed that the by directly making a POST request to the\n`apply.cgi` binary\nwith the values of the above mentioned three parameters containing\nCommand Injection\nbased payloads, it is possible to execute arbitrary commands on the\nrouter with root\nprivileges. A sub-routine respondAsp is called that\ncopies a user-controlled parameter into a stack variable using strcpy\nwithout any\nbounds check. This makes the subroutine vulnerable to BoF and can be exploited\nwithout authentication\n\nx-----------x\n\nProducts:\n- TV-IP110WN (V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64)\n- TV-IP121WN (V1.2.2 build 28)\nModule affected: `watch.cgi`\n\nA BoF vulnerability exists in the `watch.cgi` binary and how it handles\nthe `url` parameter. An attacker can deliver its payload using a POST request\nin the `url` parameter to trigger the BoF vulnerability without authentication. \n\n\nReflective XSS\n---------------\n\nProducts:\n- TEW-632BRP (1.010B32)\n- TEW-673GRU (v1.00b40)\n- TEW-634GRU (v1.01B14)\n\nModule affected: `login.cgi`\n\n`Login.cgi` in TRENDNet TEW-632BRP, TEW-673GRU and TEW-634GRU has a\nreflected XSS\nvulnerability that does not require any authentication. \n\nVendor Disclosure\n------------------\n\nThe vulnerabilities had been notified to the vendor 12/03. \nThe vendor replied on 12/05 that since the products had reached their\nend-of-life no future development or firmware updates\nwould be provided for these devices", "sources": [ { "db": "NVD", "id": "CVE-2018-19240" }, { "db": "JVNDB", "id": "JVNDB-2018-013456" }, { "db": "CNVD", "id": "CNVD-2018-25690" }, { "db": "PACKETSTORM", "id": "150693" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-19240", "trust": 3.1 }, { "db": "PACKETSTORM", "id": "150693", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2018-013456", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2018-25690", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201812-973", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-25690" }, { "db": "JVNDB", "id": "JVNDB-2018-013456" }, { "db": "PACKETSTORM", "id": "150693" }, { "db": "CNNVD", "id": "CNNVD-201812-973" }, { "db": "NVD", "id": "CVE-2018-19240" } ] }, "id": "VAR-201812-0907", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-25690" } ], "trust": 1.186904775 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-25690" } ] }, "last_update_date": "2024-11-23T21:37:54.096000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.trendnet.com/home" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013456" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013456" }, { "db": "NVD", "id": "CVE-2018-19240" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://packetstormsecurity.com/files/150693/trendnet-command-injection-buffer-overflow-cross-site-scripting.html" }, { "trust": 2.2, "url": "http://seclists.org/fulldisclosure/2018/dec/21" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19240" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19240" }, { "trust": 0.1, "url": "https://github.com/prashast/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19242" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19239" }, { "trust": 0.1, "url": "http://192.168.10.1/lan.asp`" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19241" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-25690" }, { "db": "JVNDB", "id": "JVNDB-2018-013456" }, { "db": "PACKETSTORM", "id": "150693" }, { "db": "CNNVD", "id": "CNNVD-201812-973" }, { "db": "NVD", "id": "CVE-2018-19240" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-25690" }, { "db": "JVNDB", "id": "JVNDB-2018-013456" }, { "db": "PACKETSTORM", "id": "150693" }, { "db": "CNNVD", "id": "CNNVD-201812-973" }, { "db": "NVD", "id": "CVE-2018-19240" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-12-18T00:00:00", "db": "CNVD", "id": "CNVD-2018-25690" }, { "date": "2019-02-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013456" }, { "date": "2018-12-09T23:22:22", "db": "PACKETSTORM", "id": "150693" }, { "date": "2018-12-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201812-973" }, { "date": "2018-12-20T23:29:01.113000", "db": "NVD", "id": "CVE-2018-19240" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-12-18T00:00:00", "db": "CNVD", "id": "CNVD-2018-25690" }, { "date": "2019-02-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013456" }, { "date": "2018-12-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201812-973" }, { "date": "2024-11-21T03:57:37.680000", "db": "NVD", "id": "CVE-2018-19240" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201812-973" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "TRENDnet TV-IP110WN and TV-IP121WN Device buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013456" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201812-973" } ], "trust": 0.6 } }
var-202206-1581
Vulnerability from variot
Trendnet IP-110wn camera fw_tv-ip110wn_v2(1.2.2.68) has an XSS vulnerability via the prefix parameter in /admin/general.cgi. TRENDnet of TV-IP110WN Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. Trendnet IP-110wn is a wireless network camera from Trendnet Company. The vulnerability is caused by the lack of the prefix parameter in /admin/general.cgi to filter the data provided by the user and the data output. An attacker could exploit this vulnerability to execute JavaScript code on the client side
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-1581", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tv-ip110wn", "scope": "eq", "trust": 1.0, "vendor": "trendnet", "version": "1.2.2.68" }, { "model": "tv-ip110wn", "scope": null, "trust": 0.8, "vendor": "trendnet", "version": null }, { "model": "tv-ip110wn", "scope": "eq", "trust": 0.8, "vendor": "trendnet", "version": null }, { "model": "tv-ip110wn", "scope": "eq", "trust": 0.8, "vendor": "trendnet", "version": "tv-ip110wn firmware 1.2.2.68" }, { "model": "ip-110wn", "scope": "eq", "trust": 0.6, "vendor": "trendnet", "version": "1.2.2.68" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-68508" }, { "db": "JVNDB", "id": "JVNDB-2022-012242" }, { "db": "NVD", "id": "CVE-2022-31873" } ] }, "cve": "CVE-2022-31873", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2022-31873", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2022-68508", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2022-31873", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2022-31873", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-31873", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-31873", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2022-68508", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-1723", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-31873", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-68508" }, { "db": "VULMON", "id": "CVE-2022-31873" }, { "db": "JVNDB", "id": "JVNDB-2022-012242" }, { "db": "CNNVD", "id": "CNNVD-202206-1723" }, { "db": "NVD", "id": "CVE-2022-31873" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Trendnet IP-110wn camera fw_tv-ip110wn_v2(1.2.2.68) has an XSS vulnerability via the prefix parameter in /admin/general.cgi. TRENDnet of TV-IP110WN Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. Trendnet IP-110wn is a wireless network camera from Trendnet Company. The vulnerability is caused by the lack of the prefix parameter in /admin/general.cgi to filter the data provided by the user and the data output. An attacker could exploit this vulnerability to execute JavaScript code on the client side", "sources": [ { "db": "NVD", "id": "CVE-2022-31873" }, { "db": "JVNDB", "id": "JVNDB-2022-012242" }, { "db": "CNVD", "id": "CNVD-2022-68508" }, { "db": "VULMON", "id": "CVE-2022-31873" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31873", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2022-012242", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-68508", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202206-1723", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-31873", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-68508" }, { "db": "VULMON", "id": "CVE-2022-31873" }, { "db": "JVNDB", "id": "JVNDB-2022-012242" }, { "db": "CNNVD", "id": "CNNVD-202206-1723" }, { "db": "NVD", "id": "CVE-2022-31873" } ] }, "id": "VAR-202206-1581", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-68508" } ], "trust": 1.361904775 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-68508" } ] }, "last_update_date": "2024-11-23T22:04:47.293000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.0 }, { "problemtype": "Cross-site scripting (CWE-79) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012242" }, { "db": "NVD", "id": "CVE-2022-31873" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://github.com/jayus0821/uai-poc/blob/main/trendnet/ip-110wn/xss2.md" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31873" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31873/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/79.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-68508" }, { "db": "VULMON", "id": "CVE-2022-31873" }, { "db": "JVNDB", "id": "JVNDB-2022-012242" }, { "db": "CNNVD", "id": "CNNVD-202206-1723" }, { "db": "NVD", "id": "CVE-2022-31873" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-68508" }, { "db": "VULMON", "id": "CVE-2022-31873" }, { "db": "JVNDB", "id": "JVNDB-2022-012242" }, { "db": "CNNVD", "id": "CNNVD-202206-1723" }, { "db": "NVD", "id": "CVE-2022-31873" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-08T00:00:00", "db": "CNVD", "id": "CNVD-2022-68508" }, { "date": "2022-06-17T00:00:00", "db": "VULMON", "id": "CVE-2022-31873" }, { "date": "2023-08-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-012242" }, { "date": "2022-06-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-1723" }, { "date": "2022-06-17T20:15:10.783000", "db": "NVD", "id": "CVE-2022-31873" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-13T00:00:00", "db": "CNVD", "id": "CNVD-2022-68508" }, { "date": "2022-06-28T00:00:00", "db": "VULMON", "id": "CVE-2022-31873" }, { "date": "2023-08-28T08:06:00", "db": "JVNDB", "id": "JVNDB-2022-012242" }, { "date": "2022-07-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-1723" }, { "date": "2024-11-21T07:05:24.700000", "db": "NVD", "id": "CVE-2022-31873" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1723" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "TRENDnet\u00a0 of \u00a0TV-IP110WN\u00a0 Cross-site scripting vulnerability in firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012242" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1723" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/zyw-200/IOTFuzzer/blob/master/Trendnet_response.png | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/zyw-200/IOTFuzzer/blob/master/Trendnet_response.png | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
trendnet | tv-ip110wn_firmware | 1.2.2.28 | |
trendnet | tv-ip110wn_firmware | 1.2.2.64 | |
trendnet | tv-ip110wn_firmware | 1.2.2.65 | |
trendnet | tv-ip110wn_firmware | 1.2.2.68 | |
trendnet | tv-ip110wn | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.28:*:*:*:*:*:*:*", "matchCriteriaId": "9D442045-882E-4817-8241-F645E2D3348F", "vulnerable": true }, { "criteria": "cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.64:*:*:*:*:*:*:*", "matchCriteriaId": "161D56B3-F235-426F-8E4A-3510BA0EED35", "vulnerable": true }, { "criteria": "cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.65:*:*:*:*:*:*:*", "matchCriteriaId": "E98551F5-7A47-4063-9418-A9170DBA8EA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.68:*:*:*:*:*:*:*", "matchCriteriaId": "D4EEA19C-8709-4C10-B300-B3356A279C16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:trendnet:tv-ip110wn:-:*:*:*:*:*:*:*", "matchCriteriaId": "5353AAB6-C1A0-4425-8CEC-C5EB3E79F05B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "system.cgi on TRENDnet TV-IP110WN cameras has a buffer overflow caused by an inadequate source-length check before a strcpy operation in the respondAsp function. Attackers can exploit the vulnerability by using the languse parameter with a long string. This affects 1.2.2 build 28, 64, 65, and 68." }, { "lang": "es", "value": "En el archivo system.cgi en las c\u00e1maras TRENDnet TV-IP110WN presentan un desbordamiento de b\u00fafer generado por una comprobaci\u00f3n inadecuada de longitud de fuente anterior a una operaci\u00f3n strcpy en la funci\u00f3n respondAsp. Los atacantes pueden aprovechar la vulnerabilidad utilizando el par\u00e1metro languse con una cadena larga. Esto afecta a la versi\u00f3n 1.2.2 build 28, 64, 65 y 68." } ], "id": "CVE-2019-11417", "lastModified": "2024-11-21T04:21:04.480", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-04-22T11:29:05.517", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/zyw-200/IOTFuzzer/blob/master/Trendnet_response.png" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/zyw-200/IOTFuzzer/blob/master/Trendnet_response.png" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" }, { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss1.md | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss1.md | Exploit, Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
trendnet | tv-ip110wn_firmware | 1.2.2.68 | |
trendnet | tv-ip110wn | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.68:*:*:*:*:*:*:*", "matchCriteriaId": "D4EEA19C-8709-4C10-B300-B3356A279C16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:trendnet:tv-ip110wn:-:*:*:*:*:*:*:*", "matchCriteriaId": "5353AAB6-C1A0-4425-8CEC-C5EB3E79F05B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Trendnet IP-110wn camera fw_tv-ip110wn_v2(1.2.2.68) has an xss vulnerability via the proname parameter in /admin/scheprofile.cgi" }, { "lang": "es", "value": "La c\u00e1mara Trendnet IP-110wn versi\u00f3n fw_tv-ip110wn_v2(1.2.2.68), presenta una vulnerabilidad de tipo xss por medio del par\u00e1metro proname en el archivo /admin/scheprofile.cgi" } ], "id": "CVE-2022-31875", "lastModified": "2024-11-21T07:05:25.060", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-06-17T20:15:10.867", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss1.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss1.md" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss2.md | Exploit, Tool Signature | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss2.md | Exploit, Tool Signature |
Vendor | Product | Version | |
---|---|---|---|
trendnet | tv-ip110wn_firmware | 1.2.2.68 | |
trendnet | tv-ip110wn | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.68:*:*:*:*:*:*:*", "matchCriteriaId": "D4EEA19C-8709-4C10-B300-B3356A279C16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:trendnet:tv-ip110wn:-:*:*:*:*:*:*:*", "matchCriteriaId": "5353AAB6-C1A0-4425-8CEC-C5EB3E79F05B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Trendnet IP-110wn camera fw_tv-ip110wn_v2(1.2.2.68) has an XSS vulnerability via the prefix parameter in /admin/general.cgi." }, { "lang": "es", "value": "La c\u00e1mara Trendnet IP-110wn versi\u00f3n fw_tv-ip110wn_v2(1.2.2.68), presenta una vulnerabilidad de tipo XSS por medio del par\u00e1metro prefix en el archivo /admin/general.cgi" } ], "id": "CVE-2022-31873", "lastModified": "2024-11-21T07:05:24.700", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-06-17T20:15:10.783", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Tool Signature" ], "url": "https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss2.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Tool Signature" ], "url": "https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss2.md" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://trendnet.com | Vendor Advisory | |
cve@mitre.org | http://tv-ip110wn.com | Broken Link | |
cve@mitre.org | https://github.com/yinfeidi/Vuls/blob/main/TRENDnet%20TV-IP110WN/CVE-2021-31655.md | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://trendnet.com | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://tv-ip110wn.com | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/yinfeidi/Vuls/blob/main/TRENDnet%20TV-IP110WN/CVE-2021-31655.md | Exploit, Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
trendnet | tv-ip110wn_firmware | 1.2.2.64 | |
trendnet | tv-ip110wn_firmware | 1.2.2.65 | |
trendnet | tv-ip110wn_firmware | 1.2.2.68 | |
trendnet | tv-ip110wn | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.64:*:*:*:*:*:*:*", "matchCriteriaId": "161D56B3-F235-426F-8E4A-3510BA0EED35", "vulnerable": true }, { "criteria": "cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.65:*:*:*:*:*:*:*", "matchCriteriaId": "E98551F5-7A47-4063-9418-A9170DBA8EA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.68:*:*:*:*:*:*:*", "matchCriteriaId": "D4EEA19C-8709-4C10-B300-B3356A279C16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:trendnet:tv-ip110wn:-:*:*:*:*:*:*:*", "matchCriteriaId": "5353AAB6-C1A0-4425-8CEC-C5EB3E79F05B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting (XSS) vulnerability in TRENDnet TV-IP110WN V1.2.2.64 V1.2.2.65 V1.2.2.68 via the profile parameter. in a GET request in view.cgi." }, { "lang": "es", "value": "Una vulnerabilidad de tipo Cross Site Scripting (XSS) en TRENDnet TV-IP110WN versiones V1.2.2.64 V1.2.2.65 V1.2.2.68, por medio del par\u00e1metro profile. en una petici\u00f3n GET en el archivo view.cgi" } ], "id": "CVE-2021-31655", "lastModified": "2024-11-21T06:06:05.053", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-08-10T13:15:06.907", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://trendnet.com" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://tv-ip110wn.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yinfeidi/Vuls/blob/main/TRENDnet%20TV-IP110WN/CVE-2021-31655.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://trendnet.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://tv-ip110wn.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yinfeidi/Vuls/blob/main/TRENDnet%20TV-IP110WN/CVE-2021-31655.md" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://seclists.org/fulldisclosure/2018/Dec/21 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2018/Dec/21 | Mailing List, Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
trendnet | tv-ip110wn_firmware | 1.2.2.64 | |
trendnet | tv-ip110wn_firmware | 1.2.2.65 | |
trendnet | tv-ip110wn_firmware | 1.2.2.68 | |
trendnet | tv-ip110wn | - | |
trendnet | tv-ip121wn_firmware | 1.2.2.28 | |
trendnet | tv-ip121wn | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.64:*:*:*:*:*:*:*", "matchCriteriaId": "161D56B3-F235-426F-8E4A-3510BA0EED35", "vulnerable": true }, { "criteria": "cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.65:*:*:*:*:*:*:*", "matchCriteriaId": "E98551F5-7A47-4063-9418-A9170DBA8EA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.68:*:*:*:*:*:*:*", "matchCriteriaId": "D4EEA19C-8709-4C10-B300-B3356A279C16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:trendnet:tv-ip110wn:-:*:*:*:*:*:*:*", "matchCriteriaId": "5353AAB6-C1A0-4425-8CEC-C5EB3E79F05B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:trendnet:tv-ip121wn_firmware:1.2.2.28:*:*:*:*:*:*:*", "matchCriteriaId": "BA0B4B24-4B13-4CB2-8976-037ADF847F55", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:trendnet:tv-ip121wn:-:*:*:*:*:*:*:*", "matchCriteriaId": "878BB213-FF06-48F0-B0DA-B8DFDF61DCDD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in network.cgi on TRENDnet TV-IP110WN V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64 and TV-IP121WN V1.2.2 build 28 devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (without authentication)." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en network.cgi en dispositivos TRENDnet TV-IP110WN V1.2.2 build 68, V1.2.2.65 y V1.2.2 build 64, as\u00ed como TV-IP121WN V1.2.2 build 28 permite que los atacantes secuestren el flujo de control hacia cualquier ubicaci\u00f3n especificada por el atacante, manipulando una carga \u00fatil en una petici\u00f3n POST (sin autenticaci\u00f3n)." } ], "id": "CVE-2018-19240", "lastModified": "2024-11-21T03:57:37.680", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-20T23:29:01.113", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Dec/21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Dec/21" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://seclists.org/fulldisclosure/2018/Dec/21 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2018/Dec/21 | Mailing List, Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
trendnet | tv-ip110wn_firmware | 1.2.2.64 | |
trendnet | tv-ip110wn_firmware | 1.2.2.65 | |
trendnet | tv-ip110wn_firmware | 1.2.2.68 | |
trendnet | tv-ip110wn | - | |
trendnet | tv-ip121wn_firmware | 1.2.2.28 | |
trendnet | tv-ip121wn | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.64:*:*:*:*:*:*:*", "matchCriteriaId": "161D56B3-F235-426F-8E4A-3510BA0EED35", "vulnerable": true }, { "criteria": "cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.65:*:*:*:*:*:*:*", "matchCriteriaId": "E98551F5-7A47-4063-9418-A9170DBA8EA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.68:*:*:*:*:*:*:*", "matchCriteriaId": "D4EEA19C-8709-4C10-B300-B3356A279C16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:trendnet:tv-ip110wn:-:*:*:*:*:*:*:*", "matchCriteriaId": "5353AAB6-C1A0-4425-8CEC-C5EB3E79F05B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:trendnet:tv-ip121wn_firmware:1.2.2.28:*:*:*:*:*:*:*", "matchCriteriaId": "BA0B4B24-4B13-4CB2-8976-037ADF847F55", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:trendnet:tv-ip121wn:-:*:*:*:*:*:*:*", "matchCriteriaId": "878BB213-FF06-48F0-B0DA-B8DFDF61DCDD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in video.cgi on TRENDnet TV-IP110WN V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64 and TV-IP121WN V1.2.2 build 28 devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (without authentication)." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en video.cgi en dispositivos TRENDnet TV-IP110WN V1.2.2 build 68, V1.2.2.65 y V1.2.2 build 64, as\u00ed como TV-IP121WN V1.2.2 build 28 permite que los atacantes secuestren el flujo de control hacia cualquier ubicaci\u00f3n especificada por el atacante, manipulando una carga \u00fatil en una petici\u00f3n POST (sin autenticaci\u00f3n)." } ], "id": "CVE-2018-19241", "lastModified": "2024-11-21T03:57:37.843", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-20T23:29:01.190", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Dec/21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Dec/21" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2021-31655 (GCVE-0-2021-31655)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://trendnet.com | x_refsource_MISC | |
http://tv-ip110wn.com | x_refsource_MISC | |
https://github.com/yinfeidi/Vuls/blob/main/TRENDnet%20TV-IP110WN/CVE-2021-31655.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:03:33.682Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://trendnet.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://tv-ip110wn.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/yinfeidi/Vuls/blob/main/TRENDnet%20TV-IP110WN/CVE-2021-31655.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting (XSS) vulnerability in TRENDnet TV-IP110WN V1.2.2.64 V1.2.2.65 V1.2.2.68 via the profile parameter. in a GET request in view.cgi." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-10T12:54:13", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://trendnet.com" }, { "tags": [ "x_refsource_MISC" ], "url": "http://tv-ip110wn.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/yinfeidi/Vuls/blob/main/TRENDnet%20TV-IP110WN/CVE-2021-31655.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-31655", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross Site Scripting (XSS) vulnerability in TRENDnet TV-IP110WN V1.2.2.64 V1.2.2.65 V1.2.2.68 via the profile parameter. in a GET request in view.cgi." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://trendnet.com", "refsource": "MISC", "url": "http://trendnet.com" }, { "name": "http://tv-ip110wn.com", "refsource": "MISC", "url": "http://tv-ip110wn.com" }, { "name": "https://github.com/yinfeidi/Vuls/blob/main/TRENDnet%20TV-IP110WN/CVE-2021-31655.md", "refsource": "MISC", "url": "https://github.com/yinfeidi/Vuls/blob/main/TRENDnet%20TV-IP110WN/CVE-2021-31655.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-31655", "datePublished": "2021-08-10T12:54:13", "dateReserved": "2021-04-23T00:00:00", "dateUpdated": "2024-08-03T23:03:33.682Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-19241 (GCVE-0-2018-19241)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2018/Dec/21 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:30:04.032Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html" }, { "name": "20181209 Multiple vulnerabilities found in Trendnet routers and IP Cameras.", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2018/Dec/21" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-12-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in video.cgi on TRENDnet TV-IP110WN V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64 and TV-IP121WN V1.2.2 build 28 devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (without authentication)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-20T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html" }, { "name": "20181209 Multiple vulnerabilities found in Trendnet routers and IP Cameras.", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2018/Dec/21" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-19241", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in video.cgi on TRENDnet TV-IP110WN V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64 and TV-IP121WN V1.2.2 build 28 devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (without authentication)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html" }, { "name": "20181209 Multiple vulnerabilities found in Trendnet routers and IP Cameras.", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2018/Dec/21" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-19241", "datePublished": "2018-12-20T22:00:00", "dateReserved": "2018-11-13T00:00:00", "dateUpdated": "2024-08-05T11:30:04.032Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-31873 (GCVE-0-2022-31873)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss2.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.116Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss2.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Trendnet IP-110wn camera fw_tv-ip110wn_v2(1.2.2.68) has an XSS vulnerability via the prefix parameter in /admin/general.cgi." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-17T19:26:06", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss2.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-31873", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Trendnet IP-110wn camera fw_tv-ip110wn_v2(1.2.2.68) has an XSS vulnerability via the prefix parameter in /admin/general.cgi." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss2.md", "refsource": "MISC", "url": "https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss2.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-31873", "datePublished": "2022-06-17T19:26:06", "dateReserved": "2022-05-31T00:00:00", "dateUpdated": "2024-08-03T07:26:01.116Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-11417 (GCVE-0-2019-11417)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://github.com/zyw-200/IOTFuzzer/blob/master/Trendnet_response.png | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:55:39.675Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/zyw-200/IOTFuzzer/blob/master/Trendnet_response.png" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "system.cgi on TRENDnet TV-IP110WN cameras has a buffer overflow caused by an inadequate source-length check before a strcpy operation in the respondAsp function. Attackers can exploit the vulnerability by using the languse parameter with a long string. This affects 1.2.2 build 28, 64, 65, and 68." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-21T20:09:41", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/zyw-200/IOTFuzzer/blob/master/Trendnet_response.png" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-11417", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "system.cgi on TRENDnet TV-IP110WN cameras has a buffer overflow caused by an inadequate source-length check before a strcpy operation in the respondAsp function. Attackers can exploit the vulnerability by using the languse parameter with a long string. This affects 1.2.2 build 28, 64, 65, and 68." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/zyw-200/IOTFuzzer/blob/master/Trendnet_response.png", "refsource": "MISC", "url": "https://github.com/zyw-200/IOTFuzzer/blob/master/Trendnet_response.png" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-11417", "datePublished": "2019-04-21T20:09:41", "dateReserved": "2019-04-21T00:00:00", "dateUpdated": "2024-08-04T22:55:39.675Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-31875 (GCVE-0-2022-31875)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss1.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.101Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss1.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Trendnet IP-110wn camera fw_tv-ip110wn_v2(1.2.2.68) has an xss vulnerability via the proname parameter in /admin/scheprofile.cgi" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-17T19:24:48", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss1.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-31875", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Trendnet IP-110wn camera fw_tv-ip110wn_v2(1.2.2.68) has an xss vulnerability via the proname parameter in /admin/scheprofile.cgi" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss1.md", "refsource": "MISC", "url": "https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss1.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-31875", "datePublished": "2022-06-17T19:24:48", "dateReserved": "2022-05-31T00:00:00", "dateUpdated": "2024-08-03T07:26:01.101Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-8757 (GCVE-0-2025-8757)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.319262 | vdb-entry | |
https://vuldb.com/?ctiid.319262 | signature, permissions-required | |
https://vuldb.com/?submit.624257 | third-party-advisory | |
https://www.notion.so/23e54a1113e780569260e231993bdf61 | exploit |
Vendor | Product | Version | ||
---|---|---|---|---|
TRENDnet | TV-IP110WN |
Version: 1.2.2 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-8757", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T15:23:43.183921Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-12T16:05:16.788Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "Embedded Boa Web Server" ], "product": "TV-IP110WN", "vendor": "TRENDnet", "versions": [ { "status": "affected", "version": "1.2.2" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "TPCHECKER (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TRENDnet TV-IP110WN 1.2.2 and classified as problematic. Affected by this issue is some unknown functionality of the file /server/boa.conf of the component Embedded Boa Web Server. The manipulation leads to least privilege violation. Local access is required to approach this attack. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." }, { "lang": "de", "value": "Eine Schwachstelle wurde in TRENDnet TV-IP110WN 1.2.2 gefunden. Sie wurde als problematisch eingestuft. Dies betrifft einen unbekannten Teil der Datei /server/boa.conf der Komponente Embedded Boa Web Server. Durch das Beeinflussen mit unbekannten Daten kann eine least privilege violation-Schwachstelle ausgenutzt werden. Der Angriff muss lokal passieren. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Sie ist schwierig ausnutzbar. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 6, "vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-272", "description": "Least Privilege Violation", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-266", "description": "Incorrect Privilege Assignment", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-09T15:02:05.815Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-319262 | TRENDnet TV-IP110WN Embedded Boa Web Server boa.conf least privilege violation", "tags": [ "vdb-entry" ], "url": "https://vuldb.com/?id.319262" }, { "name": "VDB-319262 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.319262" }, { "name": "Submit #624257 | TRENDnet TV-IP110WN 1.2.2 Misconfiguration", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.624257" }, { "tags": [ "exploit" ], "url": "https://www.notion.so/23e54a1113e780569260e231993bdf61" } ], "timeline": [ { "lang": "en", "time": "2025-08-08T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-08-08T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-08-08T17:38:27.000Z", "value": "VulDB entry last update" } ], "title": "TRENDnet TV-IP110WN Embedded Boa Web Server boa.conf least privilege violation" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-8757", "datePublished": "2025-08-09T15:02:05.815Z", "dateReserved": "2025-08-08T15:33:17.070Z", "dateUpdated": "2025-08-12T16:05:16.788Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-19240 (GCVE-0-2018-19240)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2018/Dec/21 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:30:04.071Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html" }, { "name": "20181209 Multiple vulnerabilities found in Trendnet routers and IP Cameras.", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2018/Dec/21" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-12-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in network.cgi on TRENDnet TV-IP110WN V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64 and TV-IP121WN V1.2.2 build 28 devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (without authentication)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-20T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html" }, { "name": "20181209 Multiple vulnerabilities found in Trendnet routers and IP Cameras.", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2018/Dec/21" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-19240", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in network.cgi on TRENDnet TV-IP110WN V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64 and TV-IP121WN V1.2.2 build 28 devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (without authentication)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html" }, { "name": "20181209 Multiple vulnerabilities found in Trendnet routers and IP Cameras.", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2018/Dec/21" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-19240", "datePublished": "2018-12-20T22:00:00", "dateReserved": "2018-11-13T00:00:00", "dateUpdated": "2024-08-05T11:30:04.071Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }