TRENDnet TEW-652BRP 3.04b01 Web Interface ping.ccp command injection

A vulnerability was found in TRENDnet TEW-652BRP 3.04b01. It has been classified as critical. Affected is an unknown function of the file ping.ccp of the component Web Interface. The manipulation leads to command injection. Using CWE to declare the problem leads to CWE-77. The weakness was published 02/02/2023. This vulnerability is traded as CVE-2023-0640. It is possible to launch the attack remotely. Technical details are available. Furthermore, there is an exploit available. The exploit has been disclosed to the public and may be used. The current price for an exploit might be approx. USD $0-$5k at the moment. The MITRE ATT&CK project declares the attack technique as T1202. It is declared as proof-of-concept. The exploit is shared for download at vuldb.com. As 0-day the estimated underground price was around $0-$5k. A possible mitigation has been published before and not just after the disclosure of the vulnerability.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

149

Field

vulnerability_cvss3_meta_tempscore2
vulnerability_cvss3_meta_basescore2
vulnerability_cvss3_cna_basescore1
vulnerability_cvss3_nvd_basescore1
vulnerability_cvss2_nvd_basescore1

Commit Conf

90%34
70%26
50%10
100%2

Approve Conf

90%34
70%25
80%10
100%2
IDCommitedUserFieldChangeRemarksAcceptedStatusC
1374258203/01/2023VulD...cvss3_cna_basescore7.2see CVSS documentation03/01/2023accepted
90
1374258103/01/2023VulD...cvss3_nvd_basescore9.8nist.gov03/01/2023accepted
90
1374258003/01/2023VulD...cvss2_nvd_basescore8.3nist.gov03/01/2023accepted
90
1374257903/01/2023VulD...cvss3_meta_tempscore7.8see CVSS documentation03/01/2023accepted
90
1374257803/01/2023VulD...cvss3_meta_basescore8.1see CVSS documentation03/01/2023accepted
90
1374257703/01/2023VulD...cve_cnaVulDBnvd.nist.gov03/01/2023accepted
70
1374257603/01/2023VulD...cvss3_cna_aHnvd.nist.gov03/01/2023accepted
70
1374257503/01/2023VulD...cvss3_cna_iHnvd.nist.gov03/01/2023accepted
70
1374257403/01/2023VulD...cvss3_cna_cHnvd.nist.gov03/01/2023accepted
70
1374257303/01/2023VulD...cvss3_cna_sUnvd.nist.gov03/01/2023accepted
70
1374257203/01/2023VulD...cvss3_cna_uiNnvd.nist.gov03/01/2023accepted
70
1374257103/01/2023VulD...cvss3_cna_prHnvd.nist.gov03/01/2023accepted
70
1374257003/01/2023VulD...cvss3_cna_acLnvd.nist.gov03/01/2023accepted
70
1374256903/01/2023VulD...cvss3_cna_avNnvd.nist.gov03/01/2023accepted
70
1374256803/01/2023VulD...cvss2_nvd_aiCnvd.nist.gov03/01/2023accepted
70
1374256703/01/2023VulD...cvss2_nvd_iiCnvd.nist.gov03/01/2023accepted
70
1374256603/01/2023VulD...cvss2_nvd_ciCnvd.nist.gov03/01/2023accepted
70
1374256503/01/2023VulD...cvss2_nvd_auMnvd.nist.gov03/01/2023accepted
70
1374256403/01/2023VulD...cvss2_nvd_acLnvd.nist.gov03/01/2023accepted
70
1374256303/01/2023VulD...cvss2_nvd_avNnvd.nist.gov03/01/2023accepted
70

52 more entries are not shown

Do you want to use VulDB in your project?

Use the official API to access entries easily!