First published: Wed Feb 01 2023(Updated: )
A vulnerability, which was classified as critical, was found in TRENDnet TEW-811DRU 1.0.10.0. Affected is an unknown function of the file /wireless/basic.asp of the component httpd. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-219936.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendnet Tew-811dru Firmware | =1.0.10.0 | |
TRENDNet TEW-811DRU | ||
All of | ||
=1.0.10.0 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0612 is a critical vulnerability found in TRENDnet TEW-811DRU 1.0.10.0, which allows remote attackers to trigger a buffer overflow via the /wireless/basic.asp file.
CVE-2023-0612 has a severity rating of 7.5 (high).
CVE-2023-0612 affects TRENDnet TEW-811DRU 1.0.10.0 by exploiting an unknown function in the /wireless/basic.asp file, leading to a buffer overflow vulnerability.
Yes, TRENDnet TEW-811DRU 1.0.10.0 is vulnerable to CVE-2023-0612.
At the moment, there are no known fixes or patches available for CVE-2023-0612. It is recommended to contact the vendor for further assistance.