Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2013-3365

EPSS 6.76% · P91
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2013-3365

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
TRENDnet TEW-812DRU router allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) wan network prefix to internet/ipv6.asp; (2) remote port to adm/management.asp; (3) pptp username, (4) pptp password, (5) ip, (6) gateway, (7) l2tp username, or (8) l2tp password to internet/wan.asp; (9) NtpDstStart, (10) NtpDstEnd, or (11) NtpDstOffset to adm/time.asp; or (12) device url to adm/management.asp. NOTE: vectors 9, 10, and 11 can be exploited by unauthenticated remote attackers by leveraging CVE-2013-3098.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Trendnet TEW-812DRU 操作系统命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Trendnet TEW-812DRU是美国趋势网络(TRENDnet)公司的一款双频千兆无线路由器产品。 TRENDnet TEW-812DRU路由器中存在安全漏洞,该漏洞源于程序没有充分过滤setNTP.cgi脚本中的‘NtpDstEnd’和‘'NtpDstOffset’字段。 远程攻击者可利用该漏洞注入任意命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2013-3365

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2013-3365

登录查看更多情报信息。

Same Patch Batch · n/a · 2014-02-04 · 24 CVEs total

CVE-2013-5427IBM InfoSphere MDM - Collaborative Edition和InfoSphere MDM Server for PIM 跨站请求伪造漏洞
CVE-2014-0834IBM General Parallel File System 远程拒绝服务漏洞
CVE-2014-0686Cisco Unified Communications Manager 提权漏洞
CVE-2014-0329ZTE ZXV10 W300 Router 信任管理漏洞
CVE-2013-7183Seowon Intech SWC-9100 Routers 授权问题漏洞
CVE-2013-7182Fortinet FortiOS 跨站脚本漏洞
CVE-2013-7181Fortinet FortiOS 跨站脚本漏洞
CVE-2013-7179Seowon Intech SWC-9100 Routers 输入验证漏洞
CVE-2013-6035多款卫星终端授权问题漏洞
CVE-2013-6034多款卫星终端信任管理漏洞
CVE-2013-6033多款Lexmark打印机跨站脚本
CVE-2013-6032多款Lexmark打印机输入验证漏洞
CVE-2011-2725Ark 目录遍历漏洞
CVE-2014-1694Open Ticket Request System 跨站请求伪造漏洞
CVE-2014-1471Open Ticket Request System SQL注入漏洞
CVE-2014-0019Socat 基于栈的缓冲区溢出漏洞
CVE-2013-3098Trendnet TEW-812DRU 跨站请求伪造漏洞
CVE-2012-6493Rapid7 Nexpose 跨站请求伪造漏洞
CVE-2014-1458Fortinet FortiGuard FortiWeb 跨站脚本漏洞
CVE-2012-2108Csound 基于栈的缓冲区错误漏洞

Showing top 20 of 24 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2013-3365

No comments yet


Leave a comment