| 제목 | TRENDnet TEW-800mb v1.0.1.0 Command Injection |
|---|
| 설명 | A command injection vulnerability has been discovered in the TRENDnet TEW-800MB AC1200 Dual Band Wireless Media Bridge. The device is intended to provide high-speed wireless connectivity for network-enabled equipment such as smart TVs, media players, and gaming consoles.
The vulnerability is located in the device’s web management interface and allows an authenticated attacker to execute arbitrary shell commands with root privileges. Because the management interface is exposed on the network and many users deploy the device using its default username and password, a remote attacker could exploit this weakness with minimal effort.
Attempts have been made to notify Trendnet regarding this issue, but no response has been received. |
|---|
| 원천 | ⚠️ https://pentagonal-time-3a7.notion.site/TRENDnet-TEW-800MB-2c7e5dd4c5a58067bc81e530bf3191c0 |
|---|
| 사용자 | Anonymous User |
|---|
| 제출 | 2025. 12. 12. AM 10:32 (4 개월 ago) |
|---|
| 모더레이션 | 2025. 12. 27. AM 11:02 (15 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 338514 [TRENDnet TEW-800MB 1.0.1.0 Management Interface /goform/wizardset do_setWizard_asp WizardConfigured 권한 상승] |
|---|
| 포인트들 | 17 |
|---|