Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Trendnet TEW-657BRM setup.cgi vpn_drop os command injection
Vulnerability Description
A vulnerability has been found in Trendnet TEW-657BRM 1.00.1. Affected by this issue is the function vpn_drop of the file /setup.cgi. The manipulation of the argument policy_name leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor confirms, that "[t]he product in question (...) has been discontinued and end of life since June 23, 2011, that is more than 14 years ago. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on our website's product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Vulnerability Title
TRENDnet TEW-657BRM 操作系统命令注入漏洞
Vulnerability Description
TRENDnet TEW-657BRM是美国趋势网络(TRENDnet)公司的一个WiFi路由器。 TRENDnet TEW-657BRM 1.00.1版本存在操作系统命令注入漏洞,该漏洞源于对文件/setup.cgi中vpn_drop函数参数policy_name的错误操作,可能导致os命令注入。
CVSS Information
N/A
Vulnerability Type
N/A