First published: Sun Apr 21 2019(Updated: )
system.cgi on TRENDnet TV-IP110WN cameras has a buffer overflow caused by an inadequate source-length check before a strcpy operation in the respondAsp function. Attackers can exploit the vulnerability by using the languse parameter with a long string. This affects 1.2.2 build 28, 64, 65, and 68.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trendnet Tv-ip110wn Firmware | =1.2.2.28 | |
Trendnet Tv-ip110wn Firmware | =1.2.2.64 | |
Trendnet Tv-ip110wn Firmware | =1.2.2.65 | |
Trendnet Tv-ip110wn Firmware | =1.2.2.68 | |
TRENDnet TV-IP110WN |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11417 is a high severity vulnerability due to the potential for remote code execution through a buffer overflow.
To fix CVE-2019-11417, update the TRENDnet TV-IP110WN camera firmware to the latest version provided by TRENDnet.
CVE-2019-11417 affects TRENDnet TV-IP110WN cameras running firmware versions 1.2.2 build 28, 64, 65, and 68.
CVE-2019-11417 is caused by a buffer overflow resulting from an inadequate source-length check before a strcpy operation in the system.cgi file.
Yes, CVE-2019-11417 can be remotely exploited by attackers using a specially crafted languse parameter.