First published: Tue Jul 09 2019(Updated: )
TRENDnet TEW-827DRU with firmware up to and including 2.04B03 contains a stack-based buffer overflow while returning an error message to the user about failure to resolve a hostname during a ping or traceroute attempt. This allows an authenticated user to execute arbitrary code. The exploit can be exercised on the local intranet or remotely if remote administration is enabled.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TRENDnet TEW-827DRU firmware | <=2.04b03 | |
TRENDnet TEW-827DRU | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13280 is a vulnerability found in TRENDnet TEW-827DRU firmware up to and including version 2.04B03, which allows an authenticated user to execute arbitrary code through a stack-based buffer overflow.
CVE-2019-13280 has a severity rating of 8.8, considered high.
CVE-2019-13280 allows an authenticated user to execute arbitrary code on the device, posing a significant security risk.