CVE-2025-8757
BaseFortify
Publication date: 2025-08-09
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| trendnet | tv-ip110wn | 1.2.2 |
| trendnet | embedded_boa_web_server | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-266 | A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor. |
| CWE-272 | The elevated privilege level required to perform operations such as chroot() should be dropped immediately after the operation is performed. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-8757 is a critical vulnerability in the TRENDnet TV-IP110WN version 1.2.2, specifically in the Embedded Boa Web Server's configuration file /server/boa.conf. The web server is configured to run with root privileges, violating the principle of least privilege. This misconfiguration allows an attacker with local access to escalate their privileges to root, potentially fully compromising the device. [1, 2]
How can this vulnerability impact me? :
This vulnerability can lead to a full compromise of the affected device because an attacker who gains local access can escalate their privileges to root. This impacts the confidentiality, integrity, and availability of the device, allowing unauthorized control and potentially malicious actions on the device. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking the configuration of the Embedded Boa Web Server on the TRENDnet TV-IP110WN device, specifically the /server/boa.conf file to see if it is running with root privileges (User ID 0, Group ID 0). Since exploitation requires local access, detection involves accessing the device locally and inspecting the configuration file permissions and user settings. Commands to check this could include: `cat /server/boa.conf` to view the configuration and `ps aux | grep boa` to check the running user of the Boa web server process. However, no specific detection commands or network-based detection methods are provided. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting local access to the affected TRENDnet TV-IP110WN device to trusted users only, as exploitation requires local access. Since the vendor has not provided any patches or fixes and no known countermeasures exist, it is recommended to consider replacing the affected product with a secure alternative. Additionally, monitoring for unauthorized local access attempts and isolating the device from critical networks can help reduce risk. [2]