Search criteria
3 vulnerabilities found for tv-ip121wn by trendnet
VAR-201209-0448
Vulnerability from variot - Updated: 2023-12-18 13:25Stack-based buffer overflow in the UltraMJCam ActiveX Control in TRENDnet SecurView TV-IP121WN Wireless Internet Camera allows remote attackers to execute arbitrary code via a long string to the OpenFileDlg method. TRENDnet TV-IP121WN is a network camera solution for surveillance. When browsing the TRENDnet TV-IP121WN device WEB interface, you will be asked to install the ActiveX control. The UltraMJCamX.ocx control incorrectly calls the OpenFileDlg() method. The attacker can submit the long parameter. Because the Unsafe call to the WideCharToMultiByte() overflow buffer is used, the vulnerability is successfully exploited. You can execute arbitrary code in the context of your application. TRENDnet TV-IP121WN is prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. Failed exploit attempts will result in denial-of-service conditions. If the attack fails, it will result in a denial of service. ----------------------------------------------------------------------
Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch
TITLE: TRENDnet UltraMJCam ActiveX Control Buffer Overflow Vulnerability
SECUNIA ADVISORY ID: SA48601
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48601/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48601
RELEASE DATE: 2012-03-29
DISCUSS ADVISORY: http://secunia.com/advisories/48601/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/48601/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=48601
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Andrea Micalizzi has discovered a vulnerability in TRENDnet UltraMJCam ActiveX Control, which can be exploited by malicious people to compromise a user's system.
The vulnerability is confirmed in version 1.1.52.18. Other versions may also be affected.
SOLUTION: Set the kill-bit for the ActiveX control.
PROVIDED AND/OR DISCOVERED BY: Andrea Micalizzi (rgod)
ORIGINAL ADVISORY: http://retrogod.altervista.org/9sg_trendnet_adv.htm
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201209-0448",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "securview wireless internet camera activex control",
"scope": "eq",
"trust": 1.6,
"vendor": "trendnet",
"version": "1.1.52.18"
},
{
"model": "securview wireless internet camera",
"scope": "eq",
"trust": 1.0,
"vendor": "trendnet",
"version": "tv-ip121wn"
},
{
"model": "tv-ip121wn",
"scope": "eq",
"trust": 0.9,
"vendor": "trendnet",
"version": "0"
},
{
"model": "securview wireless internet camera",
"scope": "eq",
"trust": 0.8,
"vendor": "trendnet",
"version": "(tv-ip121wn)"
},
{
"model": "securview wireless internet camera ultramjcam activex control",
"scope": null,
"trust": 0.8,
"vendor": "trendnet",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "securview internet camera activex control",
"version": "1.1.52.18"
},
{
"model": "tv-ip121wn",
"scope": null,
"trust": 0.2,
"vendor": "securview internet camera",
"version": null
}
],
"sources": [
{
"db": "IVD",
"id": "bac80742-1f6d-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2012-1628"
},
{
"db": "BID",
"id": "52760"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-004188"
},
{
"db": "NVD",
"id": "CVE-2012-4876"
},
{
"db": "CNNVD",
"id": "CNNVD-201203-545"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:trendnet:securview_wireless_internet_camera_activex_control:1.1.52.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:trendnet:securview_wireless_internet_camera:tv-ip121wn:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2012-4876"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "nospam",
"sources": [
{
"db": "BID",
"id": "52760"
},
{
"db": "CNNVD",
"id": "CNNVD-201203-545"
}
],
"trust": 0.9
},
"cve": "CVE-2012-4876",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 10.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2012-4876",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "bac80742-1f6d-11e6-abef-000c29c66e3d",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-58157",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2012-4876",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201203-545",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "bac80742-1f6d-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-58157",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "bac80742-1f6d-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-58157"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-004188"
},
{
"db": "NVD",
"id": "CVE-2012-4876"
},
{
"db": "CNNVD",
"id": "CNNVD-201203-545"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Stack-based buffer overflow in the UltraMJCam ActiveX Control in TRENDnet SecurView TV-IP121WN Wireless Internet Camera allows remote attackers to execute arbitrary code via a long string to the OpenFileDlg method. TRENDnet TV-IP121WN is a network camera solution for surveillance. When browsing the TRENDnet TV-IP121WN device WEB interface, you will be asked to install the ActiveX control. The UltraMJCamX.ocx control incorrectly calls the OpenFileDlg() method. The attacker can submit the long parameter. Because the Unsafe call to the WideCharToMultiByte() overflow buffer is used, the vulnerability is successfully exploited. You can execute arbitrary code in the context of your application. TRENDnet TV-IP121WN is prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. Failed exploit attempts will result in denial-of-service conditions. If the attack fails, it will result in a denial of service. ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nTRENDnet UltraMJCam ActiveX Control Buffer Overflow Vulnerability\n\nSECUNIA ADVISORY ID:\nSA48601\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/48601/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48601\n\nRELEASE DATE:\n2012-03-29\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/48601/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/48601/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48601\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nAndrea Micalizzi has discovered a vulnerability in TRENDnet\nUltraMJCam ActiveX Control, which can be exploited by malicious\npeople to compromise a user\u0027s system. \n\nThe vulnerability is confirmed in version 1.1.52.18. Other versions\nmay also be affected. \n\nSOLUTION:\nSet the kill-bit for the ActiveX control. \n\nPROVIDED AND/OR DISCOVERED BY:\nAndrea Micalizzi (rgod)\n\nORIGINAL ADVISORY:\nhttp://retrogod.altervista.org/9sg_trendnet_adv.htm\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2012-4876"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-004188"
},
{
"db": "CNVD",
"id": "CNVD-2012-1628"
},
{
"db": "BID",
"id": "52760"
},
{
"db": "IVD",
"id": "bac80742-1f6d-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-58157"
},
{
"db": "PACKETSTORM",
"id": "111447"
}
],
"trust": 2.79
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-58157",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-58157"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2012-4876",
"trust": 3.0
},
{
"db": "BID",
"id": "52760",
"trust": 2.6
},
{
"db": "SECUNIA",
"id": "48601",
"trust": 1.8
},
{
"db": "OSVDB",
"id": "80661",
"trust": 1.7
},
{
"db": "EXPLOIT-DB",
"id": "18675",
"trust": 1.7
},
{
"db": "CNNVD",
"id": "CNNVD-201203-545",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2012-1628",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2012-004188",
"trust": 0.8
},
{
"db": "NSFOCUS",
"id": "20687",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20120328 TRENDNET SECURVIEW TV-IP121WN WIRELESS INTERNET CAMERA ULTRAMJCAM ACTIVEX CONTROL OPENFILEDLG WIDECHARTOMULTIBYTE REMOTE STACK BUFFER OVERFLOW",
"trust": 0.6
},
{
"db": "IVD",
"id": "BAC80742-1F6D-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "SEEBUG",
"id": "SSVID-72733",
"trust": 0.1
},
{
"db": "SEEBUG",
"id": "SSVID-72761",
"trust": 0.1
},
{
"db": "EXPLOIT-DB",
"id": "18709",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-58157",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "111447",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "bac80742-1f6d-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2012-1628"
},
{
"db": "VULHUB",
"id": "VHN-58157"
},
{
"db": "BID",
"id": "52760"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-004188"
},
{
"db": "PACKETSTORM",
"id": "111447"
},
{
"db": "NVD",
"id": "CVE-2012-4876"
},
{
"db": "CNNVD",
"id": "CNNVD-201203-545"
}
]
},
"id": "VAR-201209-0448",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "bac80742-1f6d-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2012-1628"
},
{
"db": "VULHUB",
"id": "VHN-58157"
}
],
"trust": 1.55
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "bac80742-1f6d-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2012-1628"
}
]
},
"last_update_date": "2023-12-18T13:25:06.565000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.trendnet.com/"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2012-004188"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-58157"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-004188"
},
{
"db": "NVD",
"id": "CVE-2012-4876"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.7,
"url": "http://retrogod.altervista.org/9sg_trendnet_adv.htm"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/52760"
},
{
"trust": 1.7,
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0152.html"
},
{
"trust": 1.7,
"url": "http://www.exploit-db.com/exploits/18675"
},
{
"trust": 1.7,
"url": "http://osvdb.org/80661"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/48601"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4876"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4876"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/20687"
},
{
"trust": 0.3,
"url": "http://support.microsoft.com/kb/240797"
},
{
"trust": 0.3,
"url": "http://www.trendnet.com/store/products/proddetail.asp?prod=175_tv-ip121wn\u0026cat=151"
},
{
"trust": 0.3,
"url": "/archive/1/522112"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/48601/"
},
{
"trust": 0.1,
"url": "http://secunia.com/psi_30_beta_launch"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_intelligence/"
},
{
"trust": 0.1,
"url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48601"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/48601/#comments"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/personal/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-1628"
},
{
"db": "VULHUB",
"id": "VHN-58157"
},
{
"db": "BID",
"id": "52760"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-004188"
},
{
"db": "PACKETSTORM",
"id": "111447"
},
{
"db": "NVD",
"id": "CVE-2012-4876"
},
{
"db": "CNNVD",
"id": "CNNVD-201203-545"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "bac80742-1f6d-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2012-1628"
},
{
"db": "VULHUB",
"id": "VHN-58157"
},
{
"db": "BID",
"id": "52760"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-004188"
},
{
"db": "PACKETSTORM",
"id": "111447"
},
{
"db": "NVD",
"id": "CVE-2012-4876"
},
{
"db": "CNNVD",
"id": "CNNVD-201203-545"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2012-03-30T00:00:00",
"db": "IVD",
"id": "bac80742-1f6d-11e6-abef-000c29c66e3d"
},
{
"date": "2012-03-30T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-1628"
},
{
"date": "2012-09-06T00:00:00",
"db": "VULHUB",
"id": "VHN-58157"
},
{
"date": "2012-03-28T00:00:00",
"db": "BID",
"id": "52760"
},
{
"date": "2012-09-11T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-004188"
},
{
"date": "2012-04-01T09:50:40",
"db": "PACKETSTORM",
"id": "111447"
},
{
"date": "2012-09-06T21:55:03.207000",
"db": "NVD",
"id": "CVE-2012-4876"
},
{
"date": "2012-03-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201203-545"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2012-03-30T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-1628"
},
{
"date": "2012-09-07T00:00:00",
"db": "VULHUB",
"id": "VHN-58157"
},
{
"date": "2015-03-19T07:35:00",
"db": "BID",
"id": "52760"
},
{
"date": "2012-09-11T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-004188"
},
{
"date": "2012-09-07T04:00:00",
"db": "NVD",
"id": "CVE-2012-4876"
},
{
"date": "2012-03-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201203-545"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201203-545"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "TRENDnet TV-IP121WN ActiveX Control \u0027OpenFileDlg()\u0027 Method Buffer Overflow Vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-1628"
},
{
"db": "BID",
"id": "52760"
}
],
"trust": 0.9
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow",
"sources": [
{
"db": "IVD",
"id": "bac80742-1f6d-11e6-abef-000c29c66e3d"
},
{
"db": "CNNVD",
"id": "CNNVD-201203-545"
}
],
"trust": 0.8
}
}
VAR-201812-0908
Vulnerability from variot - Updated: 2023-12-18 12:56Buffer overflow in video.cgi on TRENDnet TV-IP110WN V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64 and TV-IP121WN V1.2.2 build 28 devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (without authentication). TRENDnet TV-IP110WN and TV-IP121WN The device contains a buffer error vulnerability.Information may be tampered with. TRENDnetTV-IP110WN is a wireless internet surveillance camera. The TRENDnetTV-IP121WN is a network camera solution for surveillance. There are BoF vulnerabilities in TRENDnetTV-IP110WN and TV-IP121WN. An attacker could use a POST request to deliver its payload to trigger a BoF vulnerability in the \"url\" parameter without authentication. ########################################### Vulnerabilities found in TRENDnet devices
Authors:Prashast Srivastava, Mathias Payer Howard Shrobe, Hamed Okhravi
Author contact: https://github.com/prashast/
Multiple vulnerabilties including Command Injection, Buffer Overflow and Reflective XSS vulnerabilties were found in the following TRENDnet devices: Routers: TEW-634GRU, TEW-673GRU, TEW-632BRP IP-Cameras: TV-IP110WN, TV-IP121WN These were found using our dynamic analysis tool for embedded devices. The POC's will be made available upon the public release of our tool. A more detailed breakdown is presented below on a per vulnerability basis:-
Command Injection
CVE-ID: CVE-2018-19239
Product: TEW-673GRU
Module affected: start_arpping function in timer binary
Firmware version: v1.00b40
TRENDnet TEW-673GRU v1.00b40 devices have an OS command injection
vulnerability in the start_arpping function of the
timer binary, which allows remote attackers to execute
arbitrary commands via three parameters (dhcpd_start, dhcpd_end, and
lan_ipaddr)
passed to the apply.cgi binary through a POST request. Exploiting the
vulnerability
requires a user to be authenticated with the router with
administrative credentials.
The start_arpping function reads the following values from the NVRAM
namely: dhcpd_start,
dhcpd_end, lan_ipaddr, lan_bridge and lan_eth. These values are then
passed to the
arpping utility without any sort of sanity checks.
Out of these values, the outward facing configuration webserver(httpd)
running at
IP:192.168.10.1 Port: 80 allows a user to modify the first three
values dhcpd_start,
dhcpd_end, lan_ipaddr via the LAN and DHCP server configuration
webpage available at
http://192.168.10.1/lan.asp by making a POST request to apply.cgi
binary with the
appropriate parameters.
We have observed that the by directly making a POST request to the
apply.cgi binary
with the values of the above mentioned three parameters containing
Command Injection
based payloads, it is possible to execute arbitrary commands on the
router with root
privileges. A sub-routine respondAsp is called that
copies a user-controlled parameter into a stack variable using strcpy
without any
bounds check.
Reflective XSS
Products: - TEW-632BRP (1.010B32) - TEW-673GRU (v1.00b40) - TEW-634GRU (v1.01B14)
Module affected: login.cgi
Login.cgi in TRENDNet TEW-632BRP, TEW-673GRU and TEW-634GRU has a
reflected XSS
vulnerability that does not require any authentication.
Vendor Disclosure
The vulnerabilities had been notified to the vendor 12/03. The vendor replied on 12/05 that since the products had reached their end-of-life no future development or firmware updates would be provided for these devices
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201812-0908",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "tv-ip110wn",
"scope": "eq",
"trust": 2.4,
"vendor": "trendnet",
"version": "1.2.2.65"
},
{
"model": "tv-ip110wn",
"scope": "eq",
"trust": 1.6,
"vendor": "trendnet",
"version": "1.2.2.64"
},
{
"model": "tv-ip110wn",
"scope": "eq",
"trust": 1.6,
"vendor": "trendnet",
"version": "1.2.2.68"
},
{
"model": "tv-ip121wn",
"scope": "eq",
"trust": 1.6,
"vendor": "trendnet",
"version": "1.2.2.28"
},
{
"model": "tv-ip110wn",
"scope": "eq",
"trust": 0.8,
"vendor": "trendnet",
"version": "1.2.2 build 64"
},
{
"model": "tv-ip110wn",
"scope": "eq",
"trust": 0.8,
"vendor": "trendnet",
"version": "1.2.2 build 68"
},
{
"model": "tv-ip121wn",
"scope": "eq",
"trust": 0.8,
"vendor": "trendnet",
"version": "1.2.2 build 28"
},
{
"model": "tv-ip121wn build",
"scope": "eq",
"trust": 0.6,
"vendor": "trendnet",
"version": "v1.2.228"
},
{
"model": "tv-ip110wn build",
"scope": "eq",
"trust": 0.6,
"vendor": "trendnet",
"version": "v1.2.268"
},
{
"model": "tv-ip110wn",
"scope": "eq",
"trust": 0.6,
"vendor": "trendnet",
"version": "v1.2.2.65"
},
{
"model": "tv-ip110wn build",
"scope": "eq",
"trust": 0.6,
"vendor": "trendnet",
"version": "v1.2.264"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-25693"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013457"
},
{
"db": "NVD",
"id": "CVE-2018-19241"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-974"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.64:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.68:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.65:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:trendnet:tv-ip110wn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:trendnet:tv-ip121wn_firmware:1.2.2.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:trendnet:tv-ip121wn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2018-19241"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Mathias Payer, Hamed Okhravi, Prashast Srivastava, Howard Shrobe",
"sources": [
{
"db": "PACKETSTORM",
"id": "150693"
}
],
"trust": 0.1
},
"cve": "CVE-2018-19241",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2018-19241",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2018-25693",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2018-19241",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2018-19241",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2018-25693",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201812-974",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-25693"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013457"
},
{
"db": "NVD",
"id": "CVE-2018-19241"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-974"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow in video.cgi on TRENDnet TV-IP110WN V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64 and TV-IP121WN V1.2.2 build 28 devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (without authentication). TRENDnet TV-IP110WN and TV-IP121WN The device contains a buffer error vulnerability.Information may be tampered with. TRENDnetTV-IP110WN is a wireless internet surveillance camera. The TRENDnetTV-IP121WN is a network camera solution for surveillance. There are BoF vulnerabilities in TRENDnetTV-IP110WN and TV-IP121WN. An attacker could use a POST request to deliver its payload to trigger a BoF vulnerability in the \\\"url\\\" parameter without authentication. ###########################################\nVulnerabilities found in TRENDnet devices\n\nAuthors:Prashast Srivastava, Mathias Payer\n Howard Shrobe, Hamed Okhravi\n\nAuthor contact: https://github.com/prashast/\n\n###########################################\n\nMultiple vulnerabilties including Command Injection, Buffer Overflow and\nReflective XSS vulnerabilties were found in the following TRENDnet devices:\nRouters: TEW-634GRU, TEW-673GRU, TEW-632BRP\nIP-Cameras: TV-IP110WN, TV-IP121WN\nThese were found using our dynamic analysis tool for embedded devices. \nThe POC\u0027s will be made available upon the public\nrelease of our tool. A more detailed breakdown is presented\nbelow on a per vulnerability basis:-\n\nCommand Injection\n------------------\n\nCVE-ID: CVE-2018-19239\nProduct: TEW-673GRU\nModule affected: `start_arpping` function in `timer` binary\nFirmware version: v1.00b40\n\nTRENDnet TEW-673GRU v1.00b40 devices have an OS command injection\nvulnerability in the `start_arpping` function of the\n`timer binary`, which allows remote attackers to execute\narbitrary commands via three parameters (dhcpd_start, dhcpd_end, and\nlan_ipaddr)\npassed to the apply.cgi binary through a POST request. Exploiting the\nvulnerability\nrequires a user to be authenticated with the router with\nadministrative credentials. \n\nThe `start_arpping` function reads the following values from the NVRAM\nnamely: dhcpd_start,\ndhcpd_end, lan_ipaddr, lan_bridge and lan_eth. These values are then\npassed to the\n`arpping` utility without any sort of sanity checks. \nOut of these values, the outward facing configuration webserver(httpd)\nrunning at\n`IP:192.168.10.1 Port: 80` allows a user to modify the first three\nvalues `dhcpd_start`,\n`dhcpd_end`, `lan_ipaddr` via the LAN and DHCP server configuration\nwebpage available at\n`http://192.168.10.1/lan.asp` by making a POST request to `apply.cgi`\nbinary with the\nappropriate parameters. \n\nWe have observed that the by directly making a POST request to the\n`apply.cgi` binary\nwith the values of the above mentioned three parameters containing\nCommand Injection\nbased payloads, it is possible to execute arbitrary commands on the\nrouter with root\nprivileges. A sub-routine respondAsp is called that\ncopies a user-controlled parameter into a stack variable using strcpy\nwithout any\nbounds check. \n\n\nReflective XSS\n---------------\n\nProducts:\n- TEW-632BRP (1.010B32)\n- TEW-673GRU (v1.00b40)\n- TEW-634GRU (v1.01B14)\n\nModule affected: `login.cgi`\n\n`Login.cgi` in TRENDNet TEW-632BRP, TEW-673GRU and TEW-634GRU has a\nreflected XSS\nvulnerability that does not require any authentication. \n\nVendor Disclosure\n------------------\n\nThe vulnerabilities had been notified to the vendor 12/03. \nThe vendor replied on 12/05 that since the products had reached their\nend-of-life no future development or firmware updates\nwould be provided for these devices",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-19241"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013457"
},
{
"db": "CNVD",
"id": "CNVD-2018-25693"
},
{
"db": "PACKETSTORM",
"id": "150693"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-19241",
"trust": 3.1
},
{
"db": "PACKETSTORM",
"id": "150693",
"trust": 2.5
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013457",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2018-25693",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201812-974",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-25693"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013457"
},
{
"db": "PACKETSTORM",
"id": "150693"
},
{
"db": "NVD",
"id": "CVE-2018-19241"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-974"
}
]
},
"id": "VAR-201812-0908",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-25693"
}
],
"trust": 1.1749999999999998
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-25693"
}
]
},
"last_update_date": "2023-12-18T12:56:42.279000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.trendnet.com/home"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-013457"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-013457"
},
{
"db": "NVD",
"id": "CVE-2018-19241"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "http://packetstormsecurity.com/files/150693/trendnet-command-injection-buffer-overflow-cross-site-scripting.html"
},
{
"trust": 2.2,
"url": "http://seclists.org/fulldisclosure/2018/dec/21"
},
{
"trust": 0.9,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-19241"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19241"
},
{
"trust": 0.1,
"url": "https://github.com/prashast/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-19242"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-19239"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-19240"
},
{
"trust": 0.1,
"url": "http://192.168.10.1/lan.asp`"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-25693"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013457"
},
{
"db": "PACKETSTORM",
"id": "150693"
},
{
"db": "NVD",
"id": "CVE-2018-19241"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-974"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2018-25693"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013457"
},
{
"db": "PACKETSTORM",
"id": "150693"
},
{
"db": "NVD",
"id": "CVE-2018-19241"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-974"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-12-18T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-25693"
},
{
"date": "2019-02-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-013457"
},
{
"date": "2018-12-09T23:22:22",
"db": "PACKETSTORM",
"id": "150693"
},
{
"date": "2018-12-20T23:29:01.190000",
"db": "NVD",
"id": "CVE-2018-19241"
},
{
"date": "2018-12-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201812-974"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-12-18T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-25693"
},
{
"date": "2019-02-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-013457"
},
{
"date": "2019-01-14T20:07:06.253000",
"db": "NVD",
"id": "CVE-2018-19241"
},
{
"date": "2018-12-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201812-974"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201812-974"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "TRENDnet TV-IP110WN and TV-IP121WN Device buffer error vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-013457"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201812-974"
}
],
"trust": 0.6
}
}
VAR-201812-0907
Vulnerability from variot - Updated: 2023-12-18 12:56Buffer overflow in network.cgi on TRENDnet TV-IP110WN V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64 and TV-IP121WN V1.2.2 build 28 devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (without authentication). TRENDnet TV-IP110WN and TV-IP121WN The device contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. TRENDnetTV-IP110WN is a wireless internet surveillance camera. The TRENDnetTV-IP121WN is a network camera solution for surveillance. A buffer overflow vulnerability exists in TRENDnetTV-IP110WN and TV-IP121WN. ########################################### Vulnerabilities found in TRENDnet devices
Authors:Prashast Srivastava, Mathias Payer Howard Shrobe, Hamed Okhravi
Author contact: https://github.com/prashast/
Multiple vulnerabilties including Command Injection, Buffer Overflow and Reflective XSS vulnerabilties were found in the following TRENDnet devices: Routers: TEW-634GRU, TEW-673GRU, TEW-632BRP IP-Cameras: TV-IP110WN, TV-IP121WN These were found using our dynamic analysis tool for embedded devices. The POC's will be made available upon the public release of our tool. A more detailed breakdown is presented below on a per vulnerability basis:-
Command Injection
CVE-ID: CVE-2018-19239
Product: TEW-673GRU
Module affected: start_arpping function in timer binary
Firmware version: v1.00b40
TRENDnet TEW-673GRU v1.00b40 devices have an OS command injection
vulnerability in the start_arpping function of the
timer binary, which allows remote attackers to execute
arbitrary commands via three parameters (dhcpd_start, dhcpd_end, and
lan_ipaddr)
passed to the apply.cgi binary through a POST request. Exploiting the
vulnerability
requires a user to be authenticated with the router with
administrative credentials.
The start_arpping function reads the following values from the NVRAM
namely: dhcpd_start,
dhcpd_end, lan_ipaddr, lan_bridge and lan_eth. These values are then
passed to the
arpping utility without any sort of sanity checks.
Out of these values, the outward facing configuration webserver(httpd)
running at
IP:192.168.10.1 Port: 80 allows a user to modify the first three
values dhcpd_start,
dhcpd_end, lan_ipaddr via the LAN and DHCP server configuration
webpage available at
http://192.168.10.1/lan.asp by making a POST request to apply.cgi
binary with the
appropriate parameters.
We have observed that the by directly making a POST request to the
apply.cgi binary
with the values of the above mentioned three parameters containing
Command Injection
based payloads, it is possible to execute arbitrary commands on the
router with root
privileges. A sub-routine respondAsp is called that
copies a user-controlled parameter into a stack variable using strcpy
without any
bounds check. This makes the subroutine vulnerable to BoF and can be exploited
without authentication
x-----------x
Products:
- TV-IP110WN (V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64)
- TV-IP121WN (V1.2.2 build 28)
Module affected: watch.cgi
A BoF vulnerability exists in the watch.cgi binary and how it handles
the url parameter. An attacker can deliver its payload using a POST request
in the url parameter to trigger the BoF vulnerability without authentication.
Reflective XSS
Products: - TEW-632BRP (1.010B32) - TEW-673GRU (v1.00b40) - TEW-634GRU (v1.01B14)
Module affected: login.cgi
Login.cgi in TRENDNet TEW-632BRP, TEW-673GRU and TEW-634GRU has a
reflected XSS
vulnerability that does not require any authentication.
Vendor Disclosure
The vulnerabilities had been notified to the vendor 12/03. The vendor replied on 12/05 that since the products had reached their end-of-life no future development or firmware updates would be provided for these devices
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201812-0907",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "tv-ip110wn",
"scope": "eq",
"trust": 2.4,
"vendor": "trendnet",
"version": "1.2.2.65"
},
{
"model": "tv-ip110wn",
"scope": "eq",
"trust": 1.6,
"vendor": "trendnet",
"version": "1.2.2.64"
},
{
"model": "tv-ip110wn",
"scope": "eq",
"trust": 1.6,
"vendor": "trendnet",
"version": "1.2.2.68"
},
{
"model": "tv-ip121wn",
"scope": "eq",
"trust": 1.6,
"vendor": "trendnet",
"version": "1.2.2.28"
},
{
"model": "tv-ip110wn",
"scope": "eq",
"trust": 0.8,
"vendor": "trendnet",
"version": "1.2.2 build 64"
},
{
"model": "tv-ip110wn",
"scope": "eq",
"trust": 0.8,
"vendor": "trendnet",
"version": "1.2.2 build 68"
},
{
"model": "tv-ip121wn",
"scope": "eq",
"trust": 0.8,
"vendor": "trendnet",
"version": "1.2.2 build 28"
},
{
"model": "tv-ip121wn build",
"scope": "eq",
"trust": 0.6,
"vendor": "trendnet",
"version": "v1.2.228"
},
{
"model": "tv-ip110wn build",
"scope": "eq",
"trust": 0.6,
"vendor": "trendnet",
"version": "v1.2.268"
},
{
"model": "tv-ip110wn",
"scope": "eq",
"trust": 0.6,
"vendor": "trendnet",
"version": "v1.2.2.65"
},
{
"model": "tv-ip110wn build",
"scope": "eq",
"trust": 0.6,
"vendor": "trendnet",
"version": "v1.2.264"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-25690"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013456"
},
{
"db": "NVD",
"id": "CVE-2018-19240"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-973"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.65:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.64:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.68:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:trendnet:tv-ip110wn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:trendnet:tv-ip121wn_firmware:1.2.2.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:trendnet:tv-ip121wn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2018-19240"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Mathias Payer, Hamed Okhravi, Prashast Srivastava, Howard Shrobe",
"sources": [
{
"db": "PACKETSTORM",
"id": "150693"
}
],
"trust": 0.1
},
"cve": "CVE-2018-19240",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2018-19240",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2018-25690",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2018-19240",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2018-19240",
"trust": 1.8,
"value": "CRITICAL"
},
{
"author": "CNVD",
"id": "CNVD-2018-25690",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201812-973",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-25690"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013456"
},
{
"db": "NVD",
"id": "CVE-2018-19240"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-973"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow in network.cgi on TRENDnet TV-IP110WN V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64 and TV-IP121WN V1.2.2 build 28 devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (without authentication). TRENDnet TV-IP110WN and TV-IP121WN The device contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. TRENDnetTV-IP110WN is a wireless internet surveillance camera. The TRENDnetTV-IP121WN is a network camera solution for surveillance. A buffer overflow vulnerability exists in TRENDnetTV-IP110WN and TV-IP121WN. ###########################################\nVulnerabilities found in TRENDnet devices\n\nAuthors:Prashast Srivastava, Mathias Payer\n Howard Shrobe, Hamed Okhravi\n\nAuthor contact: https://github.com/prashast/\n\n###########################################\n\nMultiple vulnerabilties including Command Injection, Buffer Overflow and\nReflective XSS vulnerabilties were found in the following TRENDnet devices:\nRouters: TEW-634GRU, TEW-673GRU, TEW-632BRP\nIP-Cameras: TV-IP110WN, TV-IP121WN\nThese were found using our dynamic analysis tool for embedded devices. \nThe POC\u0027s will be made available upon the public\nrelease of our tool. A more detailed breakdown is presented\nbelow on a per vulnerability basis:-\n\nCommand Injection\n------------------\n\nCVE-ID: CVE-2018-19239\nProduct: TEW-673GRU\nModule affected: `start_arpping` function in `timer` binary\nFirmware version: v1.00b40\n\nTRENDnet TEW-673GRU v1.00b40 devices have an OS command injection\nvulnerability in the `start_arpping` function of the\n`timer binary`, which allows remote attackers to execute\narbitrary commands via three parameters (dhcpd_start, dhcpd_end, and\nlan_ipaddr)\npassed to the apply.cgi binary through a POST request. Exploiting the\nvulnerability\nrequires a user to be authenticated with the router with\nadministrative credentials. \n\nThe `start_arpping` function reads the following values from the NVRAM\nnamely: dhcpd_start,\ndhcpd_end, lan_ipaddr, lan_bridge and lan_eth. These values are then\npassed to the\n`arpping` utility without any sort of sanity checks. \nOut of these values, the outward facing configuration webserver(httpd)\nrunning at\n`IP:192.168.10.1 Port: 80` allows a user to modify the first three\nvalues `dhcpd_start`,\n`dhcpd_end`, `lan_ipaddr` via the LAN and DHCP server configuration\nwebpage available at\n`http://192.168.10.1/lan.asp` by making a POST request to `apply.cgi`\nbinary with the\nappropriate parameters. \n\nWe have observed that the by directly making a POST request to the\n`apply.cgi` binary\nwith the values of the above mentioned three parameters containing\nCommand Injection\nbased payloads, it is possible to execute arbitrary commands on the\nrouter with root\nprivileges. A sub-routine respondAsp is called that\ncopies a user-controlled parameter into a stack variable using strcpy\nwithout any\nbounds check. This makes the subroutine vulnerable to BoF and can be exploited\nwithout authentication\n\nx-----------x\n\nProducts:\n- TV-IP110WN (V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64)\n- TV-IP121WN (V1.2.2 build 28)\nModule affected: `watch.cgi`\n\nA BoF vulnerability exists in the `watch.cgi` binary and how it handles\nthe `url` parameter. An attacker can deliver its payload using a POST request\nin the `url` parameter to trigger the BoF vulnerability without authentication. \n\n\nReflective XSS\n---------------\n\nProducts:\n- TEW-632BRP (1.010B32)\n- TEW-673GRU (v1.00b40)\n- TEW-634GRU (v1.01B14)\n\nModule affected: `login.cgi`\n\n`Login.cgi` in TRENDNet TEW-632BRP, TEW-673GRU and TEW-634GRU has a\nreflected XSS\nvulnerability that does not require any authentication. \n\nVendor Disclosure\n------------------\n\nThe vulnerabilities had been notified to the vendor 12/03. \nThe vendor replied on 12/05 that since the products had reached their\nend-of-life no future development or firmware updates\nwould be provided for these devices",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-19240"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013456"
},
{
"db": "CNVD",
"id": "CNVD-2018-25690"
},
{
"db": "PACKETSTORM",
"id": "150693"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-19240",
"trust": 3.1
},
{
"db": "PACKETSTORM",
"id": "150693",
"trust": 2.5
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013456",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2018-25690",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201812-973",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-25690"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013456"
},
{
"db": "PACKETSTORM",
"id": "150693"
},
{
"db": "NVD",
"id": "CVE-2018-19240"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-973"
}
]
},
"id": "VAR-201812-0907",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-25690"
}
],
"trust": 1.1749999999999998
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-25690"
}
]
},
"last_update_date": "2023-12-18T12:56:42.221000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.trendnet.com/home"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-013456"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-013456"
},
{
"db": "NVD",
"id": "CVE-2018-19240"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "http://packetstormsecurity.com/files/150693/trendnet-command-injection-buffer-overflow-cross-site-scripting.html"
},
{
"trust": 2.2,
"url": "http://seclists.org/fulldisclosure/2018/dec/21"
},
{
"trust": 0.9,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-19240"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19240"
},
{
"trust": 0.1,
"url": "https://github.com/prashast/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-19242"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-19239"
},
{
"trust": 0.1,
"url": "http://192.168.10.1/lan.asp`"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-19241"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-25690"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013456"
},
{
"db": "PACKETSTORM",
"id": "150693"
},
{
"db": "NVD",
"id": "CVE-2018-19240"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-973"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2018-25690"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013456"
},
{
"db": "PACKETSTORM",
"id": "150693"
},
{
"db": "NVD",
"id": "CVE-2018-19240"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-973"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-12-18T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-25690"
},
{
"date": "2019-02-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-013456"
},
{
"date": "2018-12-09T23:22:22",
"db": "PACKETSTORM",
"id": "150693"
},
{
"date": "2018-12-20T23:29:01.113000",
"db": "NVD",
"id": "CVE-2018-19240"
},
{
"date": "2018-12-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201812-973"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-12-18T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-25690"
},
{
"date": "2019-02-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-013456"
},
{
"date": "2019-01-14T20:12:23.543000",
"db": "NVD",
"id": "CVE-2018-19240"
},
{
"date": "2018-12-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201812-973"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201812-973"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "TRENDnet TV-IP110WN and TV-IP121WN Device buffer error vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-013456"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201812-973"
}
],
"trust": 0.6
}
}