First published: Mon Jun 15 2020(Updated: )
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action set_sta_enrollee_pin_wifi1 (or set_sta_enrollee_pin_wifi0) with a sufficiently long wps_sta_enrollee_pin key.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TRENDnet TEW-827DRU firmware | <=2.06b04 | |
TRENDnet TEW-827DRU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
It allows an authenticated user to execute arbitrary code by exploiting a stack-based buffer overflow in the ssi binary through POSTing to apply.cgi with a long wps_sta_ parameter.
The severity of CVE-2020-14077 is high with a CVSS score of 8.8.
To mitigate CVE-2020-14077, users should update the device firmware to a non-vulnerable version provided by the vendor.