First published: Thu Feb 01 2024(Updated: )
An issue in TRENDnet TEW-822DRE v.1.03B02 allows a local attacker to execute arbitrary code via the parameters ipv4_ping in the /boafrm/formSystemCheck.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trendnet TEW-822DRE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-51835 has been classified as a high severity vulnerability due to the potential for local attackers to execute arbitrary code.
To mitigate CVE-2023-51835, users should update the TRENDnet TEW-822DRE to the latest firmware version provided by TRENDnet.
CVE-2023-51835 affects users of the TRENDnet TEW-822DRE v.1.03B02 device.
Exploitation of CVE-2023-51835 could allow a local attacker to execute arbitrary code, potentially compromising the security of the affected device.
CVE-2023-51835 is a local vulnerability, meaning it requires physical access to the TRENDnet TEW-822DRE device to exploit.