Buffer Overflow in TRENDnet TEW-827DRU Devices
CVE-2020-14078

8.8HIGH

Key Information:

Vendor

Trendnet

Vendor
CVE Published:
15 June 2020

What is CVE-2020-14078?

TRENDnet TEW-827DRU devices prior to version 2.06B04 are impacted by a stack-based buffer overflow in the ssi binary. This security flaw permits an authenticated user to execute arbitrary code by sending a specially crafted POST request to apply.cgi using the action wifi_captive_portal_login. An overly long REMOTE_ADDR key can trigger the exploit, enabling potential attackers to compromise device integrity.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.