Gửi #721874: TRENDnet TEW-811DRU 1.0.4.0 OS Command Injectionthông tin

tiêu đềTRENDnet TEW-811DRU 1.0.4.0 OS Command Injection
Mô tảTrendnet TEW-815DAP firmware version x.x.x.x contains an authenticated command injection vulnerability in the setDeviceURL function. The vulnerability stems from insufficient input sanitization where the DeviceURL parameter is directly concatenated into a shell command executed via system(). Although the backend implements a blacklist to filter characters like ;, &, and `, it fails to block pipes (|) or command substitution ($()). An attacker can exploit this by logging in, extracting the hidden CSRF token from the web interface (e.g., /wizard/wizard.asp), and sending a crafted POST request to /uapply.cgi, allowing for arbitrary command execution with root privileges.
Nguồn⚠️ https://pentagonal-time-3a7.notion.site/TrendNet-TEW-811DRU-2d2e5dd4c5a58016a612e99853b835f8
Người dùng
 Anonymous User
Đệ trình23/12/2025 09:00 (cách đây 4 các tháng)
Kiểm duyệt06/01/2026 17:28 (14 days later)
Trạng tháiđược chấp nhận
Mục VulDB339722 [TRENDnet TEW-811DRU 1.0.2.0 httpd  uapply.cgi setDeviceURL  DeviceURL nâng cao đặc quyền]
điểm17

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!