ID

VAR-202302-0048


CVE

CVE-2023-0611


TITLE

TRENDnet TEW-652BRP  Command injection vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2023-002987

DESCRIPTION

A vulnerability, which was classified as critical, has been found in TRENDnet TEW-652BRP 3.04B01. This issue affects some unknown processing of the file get_set.ccp of the component Web Management Interface. The manipulation leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-219935. TRENDnet TEW-652BRP Contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2023-0611 // JVNDB: JVNDB-2023-002987 // VULMON: CVE-2023-0611

AFFECTED PRODUCTS

vendor:trendnetmodel:tew-652brpscope:eqversion:3.04b01

Trust: 1.0

vendor:trendnetmodel:tew-652brpscope:eqversion:tew-652brp firmware 3.04b01

Trust: 0.8

vendor:trendnetmodel:tew-652brpscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2023-002987 // NVD: CVE-2023-0611

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2023-0611
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2023-0611
value: HIGH

Trust: 1.0

OTHER: JVNDB-2023-002987
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202302-072
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2023-0611
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2023-002987
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

cna@vuldb.com: CVE-2023-0611
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: JVNDB-2023-002987
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-002987 // CNNVD: CNNVD-202302-072 // NVD: CVE-2023-0611 // NVD: CVE-2023-0611

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-002987 // NVD: CVE-2023-0611

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202302-072

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-202302-072

PATCH

title:Top Pageurl:https://www.trendnet.com/home

Trust: 0.8

title:TRENDnet TEW-652BRP Fixes for command injection vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=224397

Trust: 0.6

title: - url:https://github.com/Live-Hack-CVE/CVE-2023-0611

Trust: 0.1

sources: VULMON: CVE-2023-0611 // JVNDB: JVNDB-2023-002987 // CNNVD: CNNVD-202302-072

EXTERNAL IDS

db:NVDid:CVE-2023-0611

Trust: 3.3

db:VULDBid:219935

Trust: 2.5

db:JVNDBid:JVNDB-2023-002987

Trust: 0.8

db:CNNVDid:CNNVD-202302-072

Trust: 0.6

db:VULMONid:CVE-2023-0611

Trust: 0.1

sources: VULMON: CVE-2023-0611 // JVNDB: JVNDB-2023-002987 // CNNVD: CNNVD-202302-072 // NVD: CVE-2023-0611

REFERENCES

url:https://vuldb.com/?id.219935

Trust: 2.5

url:https://vuldb.com/?ctiid.219935

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2023-0611

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2023-0611/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/77.html

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2023-0611

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2023-0611 // JVNDB: JVNDB-2023-002987 // CNNVD: CNNVD-202302-072 // NVD: CVE-2023-0611

SOURCES

db:VULMONid:CVE-2023-0611
db:JVNDBid:JVNDB-2023-002987
db:CNNVDid:CNNVD-202302-072
db:NVDid:CVE-2023-0611

LAST UPDATE DATE

2024-08-14T14:43:29.580000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2023-0611date:2023-02-01T00:00:00
db:JVNDBid:JVNDB-2023-002987date:2023-08-28T07:22:00
db:CNNVDid:CNNVD-202302-072date:2023-02-09T00:00:00
db:NVDid:CVE-2023-0611date:2024-05-17T02:17:25.923

SOURCES RELEASE DATE

db:VULMONid:CVE-2023-0611date:2023-02-01T00:00:00
db:JVNDBid:JVNDB-2023-002987date:2023-08-28T00:00:00
db:CNNVDid:CNNVD-202302-072date:2023-02-01T00:00:00
db:NVDid:CVE-2023-0611date:2023-02-01T14:15:09.140