Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Tew\-632brp_firmware
(Trendnet)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 5 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-03-07 | CVE-2020-10216 | An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the date parameter in a system_time.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected. | Dir\-825_firmware, Tew\-632brp_firmware | N/A | ||
2020-03-07 | CVE-2020-10215 | An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the dns_query_name parameter in a dns_query.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected. | Dir\-825_firmware, Tew\-632brp_firmware | N/A | ||
2020-03-07 | CVE-2020-10213 | An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the wps_sta_enrollee_pin parameter in a set_sta_enrollee_pin.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected. | Dir\-825_firmware, Tew\-632brp_firmware | N/A | ||
2019-04-22 | CVE-2019-11418 | apply.cgi on the TRENDnet TEW-632BRP 1.010B32 router has a buffer overflow via long strings to the SOAPACTION:HNAP1 interface. | Tew\-632brp_firmware | 9.8 | ||
2018-12-20 | CVE-2018-19242 | Buffer overflow in apply.cgi on TRENDnet TEW-632BRP 1.010B32 and TEW-673GRU devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (with authentication). | Tew\-632brp_firmware, Tew\-673gru_firmware | 8.8 |