An issue in TRENDnet TEW-822DRE v.1.03B02 allows a local attacker to execute arbitrary code via the parameters ipv4_ping in the /boafrm/formSystemCheck.
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Link | Tags |
---|---|
https://www.trendnet.com/support/support-detail.asp?prod=105_TEW-822DRE | product |
https://warp-desk-89d.notion.site/TEW-822DRE-5289eb95796749c2878843519ab451d8 | third party advisory exploit |