9.8

CVE-2019-11417

system.cgi on TRENDnet TV-IP110WN cameras has a buffer overflow caused by an inadequate source-length check before a strcpy operation in the respondAsp function. Attackers can exploit the vulnerability by using the languse parameter with a long string. This affects 1.2.2 build 28, 64, 65, and 68.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
TrendnetTv-ip110wn Firmware Version1.2.2.28
   TrendnetTv-ip110wn Version-
TrendnetTv-ip110wn Firmware Version1.2.2.64
   TrendnetTv-ip110wn Version-
TrendnetTv-ip110wn Firmware Version1.2.2.65
   TrendnetTv-ip110wn Version-
TrendnetTv-ip110wn Firmware Version1.2.2.68
   TrendnetTv-ip110wn Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.46% 0.612
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

CWE-787 Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.