9.8
CVE-2019-11417
- EPSS 0.46%
- Published 22.04.2019 11:29:05
- Last modified 21.11.2024 04:21:04
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
system.cgi on TRENDnet TV-IP110WN cameras has a buffer overflow caused by an inadequate source-length check before a strcpy operation in the respondAsp function. Attackers can exploit the vulnerability by using the languse parameter with a long string. This affects 1.2.2 build 28, 64, 65, and 68.
Data is provided by the National Vulnerability Database (NVD)
Trendnet ≫ Tv-ip110wn Firmware Version1.2.2.28
Trendnet ≫ Tv-ip110wn Firmware Version1.2.2.64
Trendnet ≫ Tv-ip110wn Firmware Version1.2.2.65
Trendnet ≫ Tv-ip110wn Firmware Version1.2.2.68
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.46% | 0.612 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
CWE-787 Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.