| 标题 | TRENDnet TEW-800mb v1.0.1.0 Command Injection |
|---|
| 描述 | A critical command injection vulnerability exists in the NTPSyncWithHost.cgi component of the TRENDnet TEW-800MB firmware (version x.x.x.x). The vulnerability allows an authenticated attacker (or an attacker with a valid CSRF token) to execute arbitrary shell commands on the device with root privileges.
The vulnerability is located in the sub_F934 function (identified via reverse engineering, corresponding to NTPSyncWithHost in the source code) within the httpd binary. This function handles requests to the /NTPSyncWithHost.cgi endpoint. |
|---|
| 来源 | ⚠️ https://pentagonal-time-3a7.notion.site/TRENDnet-TEW-800MB-NTP-2c7e5dd4c5a580f999adcaff2c31978b |
|---|
| 用户 | Anonymous User |
|---|
| 提交 | 2025-12-12 16時59分 (4 月前) |
|---|
| 管理 | 2025-12-27 11時02分 (15 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 338515 [TRENDnet TEW-800MB 1.0.1.0 NTPSyncWithHost.cgi sub_F934 权限提升] |
|---|
| 积分 | 17 |
|---|