| Title | TRENDnet TEW-800mb v1.0.1.0 Command Injection |
|---|
| Description | A critical command injection vulnerability exists in the NTPSyncWithHost.cgi component of the TRENDnet TEW-800MB firmware (version x.x.x.x). The vulnerability allows an authenticated attacker (or an attacker with a valid CSRF token) to execute arbitrary shell commands on the device with root privileges.
The vulnerability is located in the sub_F934 function (identified via reverse engineering, corresponding to NTPSyncWithHost in the source code) within the httpd binary. This function handles requests to the /NTPSyncWithHost.cgi endpoint. |
|---|
| Source | ⚠️ https://pentagonal-time-3a7.notion.site/TRENDnet-TEW-800MB-NTP-2c7e5dd4c5a580f999adcaff2c31978b |
|---|
| User | Anonymous User |
|---|
| Submission | 12/12/2025 16:59 (4 months ago) |
|---|
| Moderation | 12/27/2025 11:02 (15 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 338515 [TRENDnet TEW-800MB 1.0.1.0 NTPSyncWithHost.cgi sub_F934 command injection] |
|---|
| Points | 17 |
|---|