First published: Tue Apr 30 2024(Updated: )
TRENDnet TEW-815DAP 1.0.2.0 is vulnerable to Command Injection via the do_setNTP function. An authenticated attacker with administrator privileges can leverage this vulnerability over the network via a malicious POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trendnet TEW-815DAP Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-22546 is classified as High due to the potential for remote command injection by an authenticated attacker.
To fix CVE-2024-22546, update the TRENDnet TEW-815DAP firmware to the latest version provided by the vendor.
Only authenticated users with administrator privileges can exploit CVE-2024-22546 by sending a malicious POST request.
Exploitation of CVE-2024-22546 can lead to unauthorized execution of commands on the device, resulting in a full system compromise.
The affected product is TRENDnet TEW-815DAP running version 1.0.2.0.