Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Trendnet TEW-657BRM setup.cgi add_apcdb stack-based overflow
Vulnerability Description
A vulnerability was identified in Trendnet TEW-657BRM 1.00.1. The affected element is the function add_apcdb of the file /setup.cgi. The manipulation of the argument mac_pc_dba leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor confirms, that "[t]he product in question (...) has been discontinued and end of life since June 23, 2011, that is more than 14 years ago. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on our website's product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
栈缓冲区溢出
Vulnerability Title
TRENDnet TEW-657BRM 安全漏洞
Vulnerability Description
TRENDnet TEW-657BRM是美国趋势网络(TRENDnet)公司的一个WiFi路由器。 TRENDnet TEW-657BRM 1.00.1版本存在安全漏洞,该漏洞源于对文件/setup.cgi中add_apcdb函数参数mac_pc_dba的错误操作,可能导致栈缓冲区溢出。
CVSS Information
N/A
Vulnerability Type
N/A