Product:

Tew\-632brp_firmware

(Trendnet)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 5
Date Id Summary Products Score Patch Annotated
2020-03-07 CVE-2020-10216 An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the date parameter in a system_time.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected. Dir\-825_firmware, Tew\-632brp_firmware N/A
2020-03-07 CVE-2020-10215 An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the dns_query_name parameter in a dns_query.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected. Dir\-825_firmware, Tew\-632brp_firmware N/A
2020-03-07 CVE-2020-10213 An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the wps_sta_enrollee_pin parameter in a set_sta_enrollee_pin.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected. Dir\-825_firmware, Tew\-632brp_firmware N/A
2019-04-22 CVE-2019-11418 apply.cgi on the TRENDnet TEW-632BRP 1.010B32 router has a buffer overflow via long strings to the SOAPACTION:HNAP1 interface. Tew\-632brp_firmware 9.8
2018-12-20 CVE-2018-19242 Buffer overflow in apply.cgi on TRENDnet TEW-632BRP 1.010B32 and TEW-673GRU devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (with authentication). Tew\-632brp_firmware, Tew\-673gru_firmware 8.8