First published: Mon Jun 15 2020(Updated: )
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action auto_up_fw (or auto_up_lp) with a sufficiently long update_file_name key.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TRENDnet TEW-827DRU | <=2.06b04 | |
TRENDnet TEW-827DRU firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14079 has a high severity rating due to the potential for remote code execution through a buffer overflow.
To mitigate CVE-2020-14079, upgrade the TRENDnet TEW-827DRU firmware to a version later than 2.06B04.
CVE-2020-14079 affects TRENDnet TEW-827DRU devices running firmware version 2.06B04 or lower.
CVE-2020-14079 is classified as a stack-based buffer overflow vulnerability.
Yes, CVE-2020-14079 can be exploited remotely by an authenticated user sending a specially crafted POST request.