TRENDnet TEW-800MB 1.0.1.0 POST Request DeviceURL elévation de privilèges

Une vulnérabilité a été trouvé dans TRENDnet TEW-800MB 1.0.1.0 et classée critique. Affecté par ce problème est une fonction inconnue du composant POST Request Handler. La manipulation du paramètre DeviceURL avec une valeur d'entrée inconnue mène à une vulnérabilité de classe elévation de privilèges. La notice d'information est disponible en téléchargement sur warp-desk-89d.notion.site. Cette vulnérabilité a été nommée CVE-2024-0918. Il est possible d'initialiser l'attaque à distance. Des details techniques sont connus. Il est déclaré comme proof-of-concept. L'exploit est disponible au téléchargment sur warp-desk-89d.notion.site. Une solution envisageable a été publiée même avant, et non après après la publication de la vulnérabilité.

Domaine28/01/2024 09:5019/02/2024 08:3919/02/2024 08:43
vendorTRENDnetTRENDnetTRENDnet
nameTEW-800MBTEW-800MBTEW-800MB
version1.0.1.01.0.1.01.0.1.0
componentPOST Request HandlerPOST Request HandlerPOST Request Handler
argumentDeviceURLDeviceURLDeviceURL
cwe78 (elévation de privilèges)78 (elévation de privilèges)78 (elévation de privilèges)
risk222
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_prHHH
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cHHH
cvss3_vuldb_iHHH
cvss3_vuldb_aHHH
cvss3_vuldb_ePPP
cvss3_vuldb_rcRRR
urlhttps://warp-desk-89d.notion.site/TEW-800MB-1f9576ce12234b72b08b9c7f4c7d32a6?pvs=4https://warp-desk-89d.notion.site/TEW-800MB-1f9576ce12234b72b08b9c7f4c7d32a6?pvs=4https://warp-desk-89d.notion.site/TEW-800MB-1f9576ce12234b72b08b9c7f4c7d32a6?pvs=4
availability111
publicity111
urlhttps://warp-desk-89d.notion.site/TEW-800MB-1f9576ce12234b72b08b9c7f4c7d32a6?pvs=4https://warp-desk-89d.notion.site/TEW-800MB-1f9576ce12234b72b08b9c7f4c7d32a6?pvs=4https://warp-desk-89d.notion.site/TEW-800MB-1f9576ce12234b72b08b9c7f4c7d32a6?pvs=4
cveCVE-2024-0918CVE-2024-0918CVE-2024-0918
responsibleVulDBVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
date1706223600 (26/01/2024)1706223600 (26/01/2024)1706223600 (26/01/2024)
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_auMMM
cvss2_vuldb_ciCCC
cvss2_vuldb_iiCCC
cvss2_vuldb_aiCCC
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcURURUR
cvss2_vuldb_rlNDNDND
cvss3_vuldb_rlXXX
cvss2_vuldb_basescore8.38.38.3
cvss2_vuldb_tempscore7.17.17.1
cvss3_vuldb_basescore7.27.27.2
cvss3_vuldb_tempscore6.56.56.5
cvss3_meta_basescore7.27.27.2
cvss3_meta_tempscore6.56.56.8
price_0day$0-$5k$0-$5k$0-$5k
cve_assigned1706223600 (26/01/2024)1706223600 (26/01/2024)
cve_nvd_summaryA vulnerability was found in TRENDnet TEW-800MB 1.0.1.0 and classified as critical. Affected by this issue is some unknown functionality of the component POST Request Handler. The manipulation of the argument DeviceURL leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252122 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was found in TRENDnet TEW-800MB 1.0.1.0 and classified as critical. Affected by this issue is some unknown functionality of the component POST Request Handler. The manipulation of the argument DeviceURL leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252122 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
cvss2_nvd_avN
cvss2_nvd_acL
cvss2_nvd_auM
cvss2_nvd_ciC
cvss2_nvd_iiC
cvss2_nvd_aiC
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prH
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cH
cvss3_cna_iH
cvss3_cna_aH
cve_cnaVulDB
cvss2_nvd_basescore8.3
cvss3_cna_basescore7.2

Do you need the next level of professionalism?

Upgrade your account now!