ID

VAR-202302-0098


CVE

CVE-2023-0640


TITLE

TRENDnet TEW-652BRP  Command injection vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2023-003133

DESCRIPTION

A vulnerability was found in TRENDnet TEW-652BRP 3.04b01. It has been classified as critical. Affected is an unknown function of the file ping.ccp of the component Web Interface. The manipulation leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220020. TRENDnet TEW-652BRP Contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TRENDnet TEW-811DRU is a wireless router produced by TRENDnet. Remote attackers can use this vulnerability to submit special requests and execute arbitrary commands

Trust: 2.25

sources: NVD: CVE-2023-0640 // JVNDB: JVNDB-2023-003133 // CNVD: CNVD-2023-22721 // VULMON: CVE-2023-0640

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2023-22721

AFFECTED PRODUCTS

vendor:trendnetmodel:tew-652brpscope:eqversion:3.04b01

Trust: 1.0

vendor:trendnetmodel:tew-652brpscope:eqversion:tew-652brp firmware 3.04b01

Trust: 0.8

vendor:trendnetmodel:tew-652brpscope:eqversion: -

Trust: 0.8

vendor:trendnetmodel:tew-811druscope:eqversion:1.0.10.0

Trust: 0.6

sources: CNVD: CNVD-2023-22721 // JVNDB: JVNDB-2023-003133 // NVD: CVE-2023-0640

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2023-0640
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2023-0640
value: CRITICAL

Trust: 1.0

OTHER: JVNDB-2023-003133
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2023-22721
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202302-140
value: CRITICAL

Trust: 0.6

cna@vuldb.com: CVE-2023-0640
severity: HIGH
baseScore: 8.3
vectorString: AV:N/AC:L/AU:M/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: MULTIPLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2023-003133
severity: HIGH
baseScore: 8.3
vectorString: AV:N/AC:L/AU:M/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: MULTIPLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2023-22721
severity: HIGH
baseScore: 8.3
vectorString: AV:N/AC:L/AU:M/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: MULTIPLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2023-0640
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2023-0640
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2023-003133
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2023-22721 // JVNDB: JVNDB-2023-003133 // CNNVD: CNNVD-202302-140 // NVD: CVE-2023-0640 // NVD: CVE-2023-0640

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-003133 // NVD: CVE-2023-0640

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202302-140

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-202302-140

PATCH

title:Top Pageurl:https://www.trendnet.com/home

Trust: 0.8

title:Patch for TRENDnet TEW-811DRU Command Injection Vulnerability (CNVD-2023-22721)url:https://www.cnvd.org.cn/patchInfo/show/416786

Trust: 0.6

title: - url:https://github.com/Live-Hack-CVE/CVE-2023-0640

Trust: 0.1

sources: CNVD: CNVD-2023-22721 // VULMON: CVE-2023-0640 // JVNDB: JVNDB-2023-003133

EXTERNAL IDS

db:NVDid:CVE-2023-0640

Trust: 3.9

db:VULDBid:220020

Trust: 1.7

db:JVNDBid:JVNDB-2023-003133

Trust: 0.8

db:CNVDid:CNVD-2023-22721

Trust: 0.6

db:CNNVDid:CNNVD-202302-140

Trust: 0.6

db:VULMONid:CVE-2023-0640

Trust: 0.1

sources: CNVD: CNVD-2023-22721 // VULMON: CVE-2023-0640 // JVNDB: JVNDB-2023-003133 // CNNVD: CNNVD-202302-140 // NVD: CVE-2023-0640

REFERENCES

url:https://vuldb.com/?id.220020

Trust: 1.7

url:https://vuldb.com/?ctiid.220020

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2023-0640

Trust: 1.4

url:https://cxsecurity.com/cveshow/cve-2023-0640/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/77.html

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2023-0640

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2023-22721 // VULMON: CVE-2023-0640 // JVNDB: JVNDB-2023-003133 // CNNVD: CNNVD-202302-140 // NVD: CVE-2023-0640

SOURCES

db:CNVDid:CNVD-2023-22721
db:VULMONid:CVE-2023-0640
db:JVNDBid:JVNDB-2023-003133
db:CNNVDid:CNNVD-202302-140
db:NVDid:CVE-2023-0640

LAST UPDATE DATE

2024-08-14T15:37:09.856000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2023-22721date:2023-03-31T00:00:00
db:VULMONid:CVE-2023-0640date:2023-02-02T00:00:00
db:JVNDBid:JVNDB-2023-003133date:2023-09-01T02:32:00
db:CNNVDid:CNNVD-202302-140date:2023-02-13T00:00:00
db:NVDid:CVE-2023-0640date:2024-05-17T02:17:27.370

SOURCES RELEASE DATE

db:CNVDid:CNVD-2023-22721date:2023-03-31T00:00:00
db:VULMONid:CVE-2023-0640date:2023-02-02T00:00:00
db:JVNDBid:JVNDB-2023-003133date:2023-09-01T00:00:00
db:CNNVDid:CNNVD-202302-140date:2023-02-02T00:00:00
db:NVDid:CVE-2023-0640date:2023-02-02T09:15:08.877