Product:

Tew\-651br_firmware

(Trendnet)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 3
Date Id Summary Products Score Patch Annotated
2017-09-21 CVE-2015-1187 The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to execute arbitrary code via the ping_addr parameter to ping.ccp. Dir\-626l_firmware, Dir\-636l_firmware, Dir\-651_firmware, Dir\-808l_firmware, Dir\-810l_firmware, Dir\-820l_firmware, Dir\-826l_firmware, Dir\-830l_firmware, Dir\-836l_firmware, Tew\-651br_firmware, Tew\-652br_firmware, Tew\-711br_firmware, Tew\-731br_firmware, Tew\-810dr_firmware, Tew\-813dru_firmware 9.8
2019-12-18 CVE-2019-11400 An issue was discovered on TRENDnet TEW-651BR 2.04B1, TEW-652BRP 3.04b01, and TEW-652BRU 1.00b12 devices. A buffer overflow occurs through the get_set.ccp ccp_act parameter. Tew\-651br_firmware, Tew\-652brp_firmware, Tew\-652bru_firmware N/A
2019-12-18 CVE-2019-11399 An issue was discovered on TRENDnet TEW-651BR 2.04B1, TEW-652BRP 3.04b01, and TEW-652BRU 1.00b12 devices. OS command injection occurs through the get_set.ccp lanHostCfg_HostName_1.1.1.0.0 parameter. Tew\-651br_firmware, Tew\-652brp_firmware, Tew\-652bru_firmware N/A