9.8

CVE-2018-19240

Buffer overflow in network.cgi on TRENDnet TV-IP110WN V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64 and TV-IP121WN V1.2.2 build 28 devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (without authentication).

Data is provided by the National Vulnerability Database (NVD)
TrendnetTv-ip110wn Firmware Version1.2.2.64
   TrendnetTv-ip110wn Version-
TrendnetTv-ip110wn Firmware Version1.2.2.65
   TrendnetTv-ip110wn Version-
TrendnetTv-ip110wn Firmware Version1.2.2.68
   TrendnetTv-ip110wn Version-
TrendnetTv-ip121wn Firmware Version1.2.2.28
   TrendnetTv-ip121wn Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 3.1% 0.856
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.