Vulnerabilities (CVE)

Filtered by vendor Trendnet Subscribe
Filtered by product Tew-827dru Firmware
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-20160 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2022-07-12 9.0 HIGH 8.8 HIGH
Trendnet AC2600 TEW-827DRU version 2.08B01 contains a command injection vulnerability in the smb functionality of the device. The username parameter used when configuring smb functionality for the device is vulnerable to command injection as root.
CVE-2021-20159 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2022-07-12 9.0 HIGH 8.8 HIGH
Trendnet AC2600 TEW-827DRU version 2.08B01 is vulnerable to command injection. The system log functionality of the firmware allows for command injection as root by supplying a malformed parameter.
CVE-2021-20157 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2022-01-10 7.8 HIGH 7.5 HIGH
It is possible for an unauthenticated, malicious user to force the device to reboot due to a hidden administrative command.
CVE-2021-20165 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2022-01-07 6.8 MEDIUM 8.8 HIGH
Trendnet AC2600 TEW-827DRU version 2.08B01 does not properly implement csrf protections. Most pages lack proper usage of CSRF protections or mitigations. Additionally, pages that do make use of CSRF tokens are trivially bypassable as the server does not appear to validate them properly (i.e. re-using an old token or finding the token thru some other method is possible).
CVE-2021-20154 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2022-01-07 4.3 MEDIUM 7.5 HIGH
Trendnet AC2600 TEW-827DRU version 2.08B01 contains an security flaw in the web interface. HTTPS is not enabled on the device by default. This results in cleartext transmission of sensitive information such as passwords.
CVE-2019-13149 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2020-08-24 6.5 MEDIUM 8.8 HIGH
An issue was discovered in TRENDnet TEW-827DRU firmware before 2.05B11. There is a command injection in apply.cgi (exploitable with authentication) via the key passwd in Routing RIP Settings.
CVE-2019-13154 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2020-08-24 6.5 MEDIUM 8.8 HIGH
An issue was discovered in TRENDnet TEW-827DRU firmware before 2.05B11. There is a command injection in apply.cgi (exploitable with authentication) via the TCP Ports To Open in Add Gaming Rule.
CVE-2019-13155 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2020-08-24 6.5 MEDIUM 8.8 HIGH
An issue was discovered in TRENDnet TEW-827DRU firmware before 2.05B11. There is a command injection in apply.cgi (exploitable with authentication) via the IP Address in Add Virtual Server.
CVE-2019-13277 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2020-08-24 5.0 MEDIUM 7.5 HIGH
TRENDnet TEW-827DRU with firmware up to and including 2.04B03 allows an unauthenticated attacker to execute setup wizard functionality, giving this attacker the ability to change configuration values, potentially leading to a denial of service. The request can be made on the local intranet or remotely if remote administration is enabled.
CVE-2019-13280 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2020-08-24 6.5 MEDIUM 8.8 HIGH
TRENDnet TEW-827DRU with firmware up to and including 2.04B03 contains a stack-based buffer overflow while returning an error message to the user about failure to resolve a hostname during a ping or traceroute attempt. This allows an authenticated user to execute arbitrary code. The exploit can be exercised on the local intranet or remotely if remote administration is enabled.
CVE-2019-13151 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2020-08-24 6.5 MEDIUM 8.8 HIGH
An issue was discovered in TRENDnet TEW-827DRU firmware before 2.05B11. There is a command injection in apply.cgi (exploitable with authentication) via the action set_sta_enrollee_pin_5g and the key wps_sta_enrollee_pin.
CVE-2019-13153 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2020-08-24 6.5 MEDIUM 8.8 HIGH
An issue was discovered in TRENDnet TEW-827DRU firmware before 2.05B11. There is a command injection in apply.cgi (exploitable with authentication) via the Private Port in Add Virtual Server.
CVE-2020-14081 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2020-06-17 9.0 HIGH 8.8 HIGH
TRENDnet TEW-827DRU devices through 2.06B04 contain multiple command injections in apply.cgi via the action send_log_email with the key auth_acname (or auth_passwd), allowing an authenticated user to run arbitrary commands on the device.
CVE-2020-14079 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2020-06-17 6.5 MEDIUM 8.8 HIGH
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action auto_up_fw (or auto_up_lp) with a sufficiently long update_file_name key.
CVE-2020-14078 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2020-06-17 6.5 MEDIUM 8.8 HIGH
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action wifi_captive_portal_login with a sufficiently long REMOTE_ADDR key.
CVE-2020-14077 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2020-06-17 6.5 MEDIUM 8.8 HIGH
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action set_sta_enrollee_pin_wifi1 (or set_sta_enrollee_pin_wifi0) with a sufficiently long wps_sta_enrollee_pin key.
CVE-2020-14075 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2020-06-17 9.0 HIGH 8.8 HIGH
TRENDnet TEW-827DRU devices through 2.06B04 contain multiple command injections in apply.cgi via the action pppoe_connect, ru_pppoe_connect, or dhcp_connect with the key wan_ifname (or wan0_dns), allowing an authenticated user to run arbitrary commands on the device.
CVE-2020-14076 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2020-06-17 6.5 MEDIUM 8.8 HIGH
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action st_dev_connect, st_dev_disconnect, or st_dev_rconnect with a sufficiently long wan_type key.
CVE-2020-14074 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2020-06-16 6.5 MEDIUM 8.8 HIGH
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action kick_ban_wifi_mac_allow with a sufficiently long qcawifi.wifi0_vap0.maclist key.
CVE-2019-13148 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2019-07-02 6.5 MEDIUM 8.8 HIGH
An issue was discovered in TRENDnet TEW-827DRU firmware before 2.05B11. There is a command injection in apply.cgi (exploitable with authentication) via the UDP Ports To Open in Add Gaming Rule.
CVE-2019-13152 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2019-07-02 6.5 MEDIUM 8.8 HIGH
An issue was discovered in TRENDnet TEW-827DRU firmware before 2.05B11. There is a command injection in apply.cgi (exploitable with authentication) via the IP Address in Add Gaming Rule.
CVE-2019-13150 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2019-07-02 6.5 MEDIUM 8.8 HIGH
An issue was discovered in TRENDnet TEW-827DRU firmware before 2.05B11. There is a command injection in apply.cgi (exploitable with authentication). The command injection exists in the key ip_addr.