First published: Wed Feb 01 2023(Updated: )
A vulnerability was found in TRENDNet TEW-811DRU 1.0.10.0. It has been classified as critical. This affects an unknown part of the file /wireless/guestnetwork.asp of the component httpd. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219957 was assigned to this vulnerability.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendnet Tew-811dru Firmware | =1.0.10.0 | |
TRENDNet TEW-811DRU | ||
All of | ||
=1.0.10.0 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-0617 is high with a severity value of 7.5.
CVE-2023-0617 affects TRENDNet TEW-811DRU firmware version 1.0.10.0 through a buffer overflow vulnerability in the /wireless/guestnetwork.asp file of the httpd component, allowing remote attacks.
No, TRENDNet TEW-811DRU is not vulnerable to CVE-2023-0617 as confirmed by the CPE entry.
To mitigate CVE-2023-0617, it is recommended to apply the latest firmware update provided by TRENDNet or follow any official security advisories from the vendor.
You can find more information about CVE-2023-0617 at the following references: [Link 1](https://vuldb.com/?id.219957), [Link 2](https://vuldb.com/?ctiid.219957).