Vulnerability Description
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an unauthenticated user to execute arbitrary code by POSTing to apply_sec.cgi via the action ping_test with a sufficiently long ping_ipaddr key.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trendnet | Tew-827Dru Firmware | <= 2.06b04 |
| Trendnet | Tew-827Dru | - |
Related Weaknesses (CWE)
References
- https://github.com/kuc001/IoTFirmware/blob/master/Trendnet/TEW-827/TRENDnet-pingThird Party Advisory
- https://github.com/kuc001/IoTFirmware/blob/master/Trendnet/TEW-827/ping_test_oveThird Party Advisory
- https://github.com/kuc001/IoTFirmware/blob/master/Trendnet/TEW-827/TRENDnet-pingThird Party Advisory
- https://github.com/kuc001/IoTFirmware/blob/master/Trendnet/TEW-827/ping_test_oveThird Party Advisory
FAQ
What is CVE-2020-14080?
CVE-2020-14080 is a vulnerability with a CVSS score of 9.8 (CRITICAL). TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an unauthenticated user to execute arbitrary code by POSTing to apply_sec.cgi v...
How severe is CVE-2020-14080?
CVE-2020-14080 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-14080?
Check the references section above for vendor advisories and patch information. Affected products include: Trendnet Tew-827Dru Firmware, Trendnet Tew-827Dru.