First published: Wed Jul 10 2019(Updated: )
TRENDnet TEW-827DRU with firmware up to and including 2.04B03 contains multiple stack-based buffer overflows when processing user input for the setup wizard, allowing an unauthenticated user to execute arbitrary code. The vulnerability can be exercised on the local intranet or remotely if remote administration is enabled.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TRENDnet TEW-827DRU firmware | <=2.04b03 | |
TRENDnet TEW-827DRU | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-13279 is rated as critical with a CVSS score of 9.8.
An unauthenticated user can exploit CVE-2019-13279 by using multiple stack-based buffer overflows to execute arbitrary code on the affected TRENDnet TEW-827DRU devices.
CVE-2019-13279 can be exploited remotely if remote admin access is enabled on the affected TRENDnet TEW-827DRU devices.