| 제목 | TRENDnet TEW-811DRU 1.0.4.0 OS Command Injection |
|---|
| 설명 | Trendnet TEW-815DAP firmware version x.x.x.x contains an authenticated command injection vulnerability in the setDeviceURL function. The vulnerability stems from insufficient input sanitization where the DeviceURL parameter is directly concatenated into a shell command executed via system(). Although the backend implements a blacklist to filter characters like ;, &, and `, it fails to block pipes (|) or command substitution ($()). An attacker can exploit this by logging in, extracting the hidden CSRF token from the web interface (e.g., /wizard/wizard.asp), and sending a crafted POST request to /uapply.cgi, allowing for arbitrary command execution with root privileges. |
|---|
| 원천 | ⚠️ https://pentagonal-time-3a7.notion.site/TrendNet-TEW-811DRU-2d2e5dd4c5a58016a612e99853b835f8 |
|---|
| 사용자 | Anonymous User |
|---|
| 제출 | 2025. 12. 23. AM 09:00 (4 개월 ago) |
|---|
| 모더레이션 | 2026. 01. 06. PM 05:28 (14 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 339722 [TRENDnet TEW-811DRU 1.0.2.0 httpd uapply.cgi setDeviceURL DeviceURL 권한 상승] |
|---|
| 포인트들 | 17 |
|---|