Stack-Based Buffer Overflow in TRENDnet TEW-827DRU Devices
CVE-2020-14077

8.8HIGH

Key Information:

Vendor

Trendnet

Vendor
CVE Published:
15 June 2020

What is CVE-2020-14077?

The TRENDnet TEW-827DRU is vulnerable to a stack-based buffer overflow in the ssi binary due to improper handling of user input in the apply.cgi script. An authenticated user can exploit this vulnerability by sending a specially crafted POST request to the set_sta_enrollee_pin_wifi1 or set_sta_enrollee_pin_wifi0 actions with an excessively long wps_sta_enrollee_pin key. This can lead to arbitrary code execution, enabling the attacker to execute malicious commands or gain unauthorized access to the device.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.