| Titre | TRENDnet TEW-800mb v1.0.1.0 Command Injection |
|---|
| Description | A critical command injection vulnerability exists in the NTPSyncWithHost.cgi component of the TRENDnet TEW-800MB firmware (version x.x.x.x). The vulnerability allows an authenticated attacker (or an attacker with a valid CSRF token) to execute arbitrary shell commands on the device with root privileges.
The vulnerability is located in the sub_F934 function (identified via reverse engineering, corresponding to NTPSyncWithHost in the source code) within the httpd binary. This function handles requests to the /NTPSyncWithHost.cgi endpoint. |
|---|
| La source | ⚠️ https://pentagonal-time-3a7.notion.site/TRENDnet-TEW-800MB-NTP-2c7e5dd4c5a580f999adcaff2c31978b |
|---|
| Utilisateur | Anonymous User |
|---|
| Soumission | 12/12/2025 16:59 (il y a 4 mois) |
|---|
| Modérer | 27/12/2025 11:02 (15 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 338515 [TRENDnet TEW-800MB 1.0.1.0 NTPSyncWithHost.cgi sub_F934 élévation de privilèges] |
|---|
| Points | 17 |
|---|