{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-0617","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-02-01T16:44:10.226Z","datePublished":"2023-02-01T16:45:08.636Z","dateUpdated":"2024-08-02T05:17:50.099Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T19:54:15.125Z"},"title":"TRENDNet TEW-811DRU httpd guestnetwork.asp buffer overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-120","lang":"en","description":"CWE-120 Buffer Overflow"}]}],"affected":[{"vendor":"TRENDNet","product":"TEW-811DRU","versions":[{"version":"1.0.10.0","status":"affected"}],"modules":["httpd"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in TRENDNet TEW-811DRU 1.0.10.0. It has been classified as critical. This affects an unknown part of the file /wireless/guestnetwork.asp of the component httpd. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219957 was assigned to this vulnerability."},{"lang":"de","value":"Es wurde eine Schwachstelle in TRENDNet TEW-811DRU 1.0.10.0 ausgemacht. Sie wurde als kritisch eingestuft. Es geht dabei um eine nicht klar definierte Funktion der Datei /wireless/guestnetwork.asp der Komponente httpd. Dank Manipulation mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":7.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.8,"vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C"}}],"timeline":[{"time":"2023-02-01T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-02-01T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-02-01T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-03-01T13:36:22.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"leetsun (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.219957","tags":["vdb-entry","technical-description","exploit"]},{"url":"https://vuldb.com/?ctiid.219957","tags":["signature"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:17:50.099Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.219957","tags":["vdb-entry","technical-description","exploit","x_transferred"]},{"url":"https://vuldb.com/?ctiid.219957","tags":["signature","x_transferred"]}]}]}}