CVE-2023-51148

An issue in TRENDnet Trendnet AC1200 Dual Band PoE Indoor Wireless Access Point TEW-821DAP v.3.00b06 allows an attacker to execute arbitrary code via the 'mycli' command-line interface component.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:trendnet:tew-821dap_firmware:3.00b06:*:*:*:*:*:*:*
OR cpe:2.3:h:trendnet:tew-821dap:2.0r:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:tew-821dap:2.5r:*:*:*:*:*:*:*

History

27 May 2025, 16:30

Type Values Removed Values Added
References () http://trendnet.com - () http://trendnet.com - Product
References () https://github.com/SpikeReply/advisories/blob/main/cve/trendnet/cve-2023-51148.md - () https://github.com/SpikeReply/advisories/blob/main/cve/trendnet/cve-2023-51148.md - Third Party Advisory, Exploit
CPE cpe:2.3:h:trendnet:tew-821dap:2.0r:*:*:*:*:*:*:*
cpe:2.3:o:trendnet:tew-821dap_firmware:3.00b06:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:tew-821dap:2.5r:*:*:*:*:*:*:*
First Time Trendnet
Trendnet tew-821dap
Trendnet tew-821dap Firmware

Information

Published : 2024-03-26 21:15

Updated : 2025-05-27 16:30


NVD link : CVE-2023-51148

Mitre link : CVE-2023-51148

CVE.ORG link : CVE-2023-51148


JSON object : View

Products Affected

trendnet

  • tew-821dap_firmware
  • tew-821dap
CWE
CWE-121

Stack-based Buffer Overflow