| Título | TRENDnet TEW-800mb v1.0.1.0 Command Injection |
|---|
| Descripción | A critical command injection vulnerability exists in the NTPSyncWithHost.cgi component of the TRENDnet TEW-800MB firmware (version x.x.x.x). The vulnerability allows an authenticated attacker (or an attacker with a valid CSRF token) to execute arbitrary shell commands on the device with root privileges.
The vulnerability is located in the sub_F934 function (identified via reverse engineering, corresponding to NTPSyncWithHost in the source code) within the httpd binary. This function handles requests to the /NTPSyncWithHost.cgi endpoint. |
|---|
| Fuente | ⚠️ https://pentagonal-time-3a7.notion.site/TRENDnet-TEW-800MB-NTP-2c7e5dd4c5a580f999adcaff2c31978b |
|---|
| Usuario | Anonymous User |
|---|
| Sumisión | 2025-12-12 16:59 (hace 4 meses) |
|---|
| Moderación | 2025-12-27 11:02 (15 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 338515 [TRENDnet TEW-800MB 1.0.1.0 NTPSyncWithHost.cgi sub_F934 escalada de privilegios] |
|---|
| Puntos | 17 |
|---|