var-201812-0908
Vulnerability from variot

Buffer overflow in video.cgi on TRENDnet TV-IP110WN V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64 and TV-IP121WN V1.2.2 build 28 devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (without authentication). TRENDnet TV-IP110WN and TV-IP121WN The device contains a buffer error vulnerability.Information may be tampered with. TRENDnetTV-IP110WN is a wireless internet surveillance camera. The TRENDnetTV-IP121WN is a network camera solution for surveillance. There are BoF vulnerabilities in TRENDnetTV-IP110WN and TV-IP121WN. An attacker could use a POST request to deliver its payload to trigger a BoF vulnerability in the \"url\" parameter without authentication. ########################################### Vulnerabilities found in TRENDnet devices

Authors:Prashast Srivastava, Mathias Payer Howard Shrobe, Hamed Okhravi

Author contact: https://github.com/prashast/

Multiple vulnerabilties including Command Injection, Buffer Overflow and Reflective XSS vulnerabilties were found in the following TRENDnet devices: Routers: TEW-634GRU, TEW-673GRU, TEW-632BRP IP-Cameras: TV-IP110WN, TV-IP121WN These were found using our dynamic analysis tool for embedded devices. The POC's will be made available upon the public release of our tool. A more detailed breakdown is presented below on a per vulnerability basis:-

Command Injection

CVE-ID: CVE-2018-19239 Product: TEW-673GRU Module affected: start_arpping function in timer binary Firmware version: v1.00b40

TRENDnet TEW-673GRU v1.00b40 devices have an OS command injection vulnerability in the start_arpping function of the timer binary, which allows remote attackers to execute arbitrary commands via three parameters (dhcpd_start, dhcpd_end, and lan_ipaddr) passed to the apply.cgi binary through a POST request. Exploiting the vulnerability requires a user to be authenticated with the router with administrative credentials.

The start_arpping function reads the following values from the NVRAM namely: dhcpd_start, dhcpd_end, lan_ipaddr, lan_bridge and lan_eth. These values are then passed to the arpping utility without any sort of sanity checks. Out of these values, the outward facing configuration webserver(httpd) running at IP:192.168.10.1 Port: 80 allows a user to modify the first three values dhcpd_start, dhcpd_end, lan_ipaddr via the LAN and DHCP server configuration webpage available at http://192.168.10.1/lan.asp by making a POST request to apply.cgi binary with the appropriate parameters.

We have observed that the by directly making a POST request to the apply.cgi binary with the values of the above mentioned three parameters containing Command Injection based payloads, it is possible to execute arbitrary commands on the router with root privileges. A sub-routine respondAsp is called that copies a user-controlled parameter into a stack variable using strcpy without any bounds check.

Reflective XSS

Products: - TEW-632BRP (1.010B32) - TEW-673GRU (v1.00b40) - TEW-634GRU (v1.01B14)

Module affected: login.cgi

Login.cgi in TRENDNet TEW-632BRP, TEW-673GRU and TEW-634GRU has a reflected XSS vulnerability that does not require any authentication.

Vendor Disclosure

The vulnerabilities had been notified to the vendor 12/03. The vendor replied on 12/05 that since the products had reached their end-of-life no future development or firmware updates would be provided for these devices

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201812-0908",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "tv-ip110wn",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "trendnet",
        "version": "1.2.2.65"
      },
      {
        "model": "tv-ip110wn",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "trendnet",
        "version": "1.2.2.64"
      },
      {
        "model": "tv-ip121wn",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "trendnet",
        "version": "1.2.2.28"
      },
      {
        "model": "tv-ip110wn",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "trendnet",
        "version": "1.2.2.68"
      },
      {
        "model": "tv-ip110wn",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "trendnet",
        "version": "1.2.2 build 64"
      },
      {
        "model": "tv-ip110wn",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "trendnet",
        "version": "1.2.2 build 68"
      },
      {
        "model": "tv-ip121wn",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "trendnet",
        "version": "1.2.2 build 28"
      },
      {
        "model": "tv-ip121wn build",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "trendnet",
        "version": "v1.2.228"
      },
      {
        "model": "tv-ip110wn build",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "trendnet",
        "version": "v1.2.268"
      },
      {
        "model": "tv-ip110wn",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "trendnet",
        "version": "v1.2.2.65"
      },
      {
        "model": "tv-ip110wn build",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "trendnet",
        "version": "v1.2.264"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-25693"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013457"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201812-974"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19241"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:trendnet:tv-ip110wn_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:trendnet:tv-ip121wn_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013457"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Mathias Payer, Hamed Okhravi, Prashast Srivastava, Howard Shrobe",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "150693"
      }
    ],
    "trust": 0.1
  },
  "cve": "CVE-2018-19241",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2018-19241",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2018-25693",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2018-19241",
            "impactScore": 3.6,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-19241",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2018-19241",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-25693",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201812-974",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-25693"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013457"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201812-974"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19241"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in video.cgi on TRENDnet TV-IP110WN V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64 and TV-IP121WN V1.2.2 build 28 devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (without authentication). TRENDnet TV-IP110WN and TV-IP121WN The device contains a buffer error vulnerability.Information may be tampered with. TRENDnetTV-IP110WN is a wireless internet surveillance camera. The TRENDnetTV-IP121WN is a network camera solution for surveillance. There are BoF vulnerabilities in TRENDnetTV-IP110WN and TV-IP121WN. An attacker could use a POST request to deliver its payload to trigger a BoF vulnerability in the \\\"url\\\" parameter without authentication. ###########################################\nVulnerabilities found in TRENDnet devices\n\nAuthors:Prashast Srivastava, Mathias Payer\n        Howard Shrobe, Hamed Okhravi\n\nAuthor contact: https://github.com/prashast/\n\n###########################################\n\nMultiple vulnerabilties including Command Injection, Buffer Overflow and\nReflective XSS vulnerabilties were found in the following TRENDnet devices:\nRouters: TEW-634GRU, TEW-673GRU, TEW-632BRP\nIP-Cameras: TV-IP110WN, TV-IP121WN\nThese were found using our dynamic analysis tool for embedded devices. \nThe POC\u0027s will be made available upon the public\nrelease of our tool. A more detailed breakdown is presented\nbelow on a per vulnerability basis:-\n\nCommand Injection\n------------------\n\nCVE-ID: CVE-2018-19239\nProduct: TEW-673GRU\nModule affected: `start_arpping` function in `timer` binary\nFirmware version: v1.00b40\n\nTRENDnet TEW-673GRU v1.00b40 devices have an OS command injection\nvulnerability in the `start_arpping` function of the\n`timer binary`, which allows remote attackers to execute\narbitrary commands via three parameters  (dhcpd_start, dhcpd_end, and\nlan_ipaddr)\npassed to the apply.cgi binary through a POST request. Exploiting the\nvulnerability\nrequires a user to be authenticated with the router with\nadministrative credentials. \n\nThe `start_arpping` function reads the following values from the NVRAM\nnamely: dhcpd_start,\ndhcpd_end, lan_ipaddr, lan_bridge and lan_eth. These values are then\npassed to the\n`arpping` utility without any sort of sanity checks. \nOut of these values, the outward facing configuration webserver(httpd)\nrunning at\n`IP:192.168.10.1 Port: 80` allows a user to modify the first three\nvalues `dhcpd_start`,\n`dhcpd_end`, `lan_ipaddr` via the LAN and DHCP server configuration\nwebpage available at\n`http://192.168.10.1/lan.asp` by making a POST request to `apply.cgi`\nbinary with the\nappropriate parameters. \n\nWe have observed that the by directly making a POST request to the\n`apply.cgi` binary\nwith the values of the above mentioned three parameters containing\nCommand Injection\nbased payloads, it is possible to execute arbitrary commands on the\nrouter with root\nprivileges. A sub-routine respondAsp is called that\ncopies a user-controlled parameter into a stack variable using strcpy\nwithout any\nbounds check. \n\n\nReflective XSS\n---------------\n\nProducts:\n- TEW-632BRP (1.010B32)\n- TEW-673GRU (v1.00b40)\n- TEW-634GRU (v1.01B14)\n\nModule affected: `login.cgi`\n\n`Login.cgi` in TRENDNet TEW-632BRP, TEW-673GRU and TEW-634GRU has a\nreflected XSS\nvulnerability that does not require any authentication. \n\nVendor Disclosure\n------------------\n\nThe vulnerabilities had been notified to the vendor 12/03. \nThe vendor replied on 12/05 that since the products had reached their\nend-of-life no future development or firmware updates\nwould be  provided for these devices",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-19241"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013457"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-25693"
      },
      {
        "db": "PACKETSTORM",
        "id": "150693"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-19241",
        "trust": 3.1
      },
      {
        "db": "PACKETSTORM",
        "id": "150693",
        "trust": 2.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013457",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-25693",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201812-974",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-25693"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013457"
      },
      {
        "db": "PACKETSTORM",
        "id": "150693"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201812-974"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19241"
      }
    ]
  },
  "id": "VAR-201812-0908",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-25693"
      }
    ],
    "trust": 1.186904775
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-25693"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:37:54.188000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.trendnet.com/home"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013457"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013457"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19241"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "http://packetstormsecurity.com/files/150693/trendnet-command-injection-buffer-overflow-cross-site-scripting.html"
      },
      {
        "trust": 2.2,
        "url": "http://seclists.org/fulldisclosure/2018/dec/21"
      },
      {
        "trust": 0.9,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19241"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19241"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/prashast/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19242"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19239"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19240"
      },
      {
        "trust": 0.1,
        "url": "http://192.168.10.1/lan.asp`"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-25693"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013457"
      },
      {
        "db": "PACKETSTORM",
        "id": "150693"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201812-974"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19241"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-25693"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013457"
      },
      {
        "db": "PACKETSTORM",
        "id": "150693"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201812-974"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19241"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-12-18T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-25693"
      },
      {
        "date": "2019-02-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-013457"
      },
      {
        "date": "2018-12-09T23:22:22",
        "db": "PACKETSTORM",
        "id": "150693"
      },
      {
        "date": "2018-12-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201812-974"
      },
      {
        "date": "2018-12-20T23:29:01.190000",
        "db": "NVD",
        "id": "CVE-2018-19241"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-12-18T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-25693"
      },
      {
        "date": "2019-02-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-013457"
      },
      {
        "date": "2018-12-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201812-974"
      },
      {
        "date": "2024-11-21T03:57:37.843000",
        "db": "NVD",
        "id": "CVE-2018-19241"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201812-974"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "TRENDnet TV-IP110WN and  TV-IP121WN Device buffer error vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013457"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201812-974"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…