cve/2019/CVE-2019-13276.md

18 lines
848 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-13276](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13276)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
TRENDnet TEW-827DRU with firmware up to and including 2.04B03 contains a stack-based buffer overflow in the ssi binary. The overflow allows an unauthenticated user to execute arbitrary code by providing a sufficiently long query string when POSTing to any valid cgi, txt, asp, or js file. The vulnerability can be exercised on the local intranet or remotely if remote administration is enabled.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/5l1v3r1/CVE-2019-13276