8.8
CVE-2018-19242
- EPSS 2.88%
- Veröffentlicht 20.12.2018 23:29:01
- Zuletzt bearbeitet 21.11.2024 03:57:38
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Buffer overflow in apply.cgi on TRENDnet TEW-632BRP 1.010B32 and TEW-673GRU devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (with authentication).
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Trendnet ≫ Tew-632brp Firmware Version1.010b32
Trendnet ≫ Tew-673gru Firmware Version1.00b40
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 2.88% | 0.85 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 6.5 | 8 | 6.4 |
AV:N/AC:L/Au:S/C:P/I:P/A:P
|
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.