Vulnerability Description
Buffer overflow in apply.cgi on TRENDnet TEW-632BRP 1.010B32 and TEW-673GRU devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (with authentication).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trendnet | Tew-632Brp Firmware | 1.010b32 |
| Trendnet | Tew-632Brp | - |
| Trendnet | Tew-673Gru Firmware | 1.00b40 |
| Trendnet | Tew-673Gru | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-OvThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2018/Dec/21Mailing ListThird Party Advisory
- http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-OvThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2018/Dec/21Mailing ListThird Party Advisory
FAQ
What is CVE-2018-19242?
CVE-2018-19242 is a vulnerability with a CVSS score of 8.8 (HIGH). Buffer overflow in apply.cgi on TRENDnet TEW-632BRP 1.010B32 and TEW-673GRU devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (w...
How severe is CVE-2018-19242?
CVE-2018-19242 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-19242?
Check the references section above for vendor advisories and patch information. Affected products include: Trendnet Tew-632Brp Firmware, Trendnet Tew-632Brp, Trendnet Tew-673Gru Firmware, Trendnet Tew-673Gru.