Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2018-19242
Buffer overflow in apply.cgi on TRENDnet TEW-632BRP 1.010B32 and TEW-673GRU devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (with authentication).
Exploit prediction scoring system (EPSS) score
EPSS Score
0.029
EPSS Ranking
85.7%
CVSS Severity
CVSS v3 Score
8.8
CVSS v2 Score
6.5
References
http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2018/Dec/21
http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2018/Dec/21
Products affected by CVE-2018-19242
Trendnet
»
Tew-632brp
»
Version:
N/A
cpe:2.3:h:trendnet:tew-632brp:-
Trendnet
»
Tew-673gru
»
Version:
N/A
cpe:2.3:h:trendnet:tew-673gru:-
Trendnet
»
Tew-632brp Firmware
»
Version:
1.010b32
cpe:2.3:o:trendnet:tew-632brp_firmware:1.010b32
Trendnet
»
Tew-673gru Firmware
»
Version:
1.00b40
cpe:2.3:o:trendnet:tew-673gru_firmware:1.00b40
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved