First published: Sun Apr 21 2019(Updated: )
system.cgi on TRENDnet TV-IP110WN cameras has a buffer overflow caused by an inadequate source-length check before a strcpy operation in the respondAsp function. Attackers can exploit the vulnerability by using the languse parameter with a long string. This affects 1.2.2 build 28, 64, 65, and 68.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trendnet Tv-ip110wn Firmware | =1.2.2.28 | |
Trendnet Tv-ip110wn Firmware | =1.2.2.64 | |
Trendnet Tv-ip110wn Firmware | =1.2.2.65 | |
Trendnet Tv-ip110wn Firmware | =1.2.2.68 | |
TRENDnet TV-IP110WN |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.