TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action wizard_ipv6 with a sufficiently long reboot_type key.
History

Tue, 01 Apr 2025 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Trendnet tew-827dru
CPEs cpe:2.3:h:trendnet:tew-827dru:-:*:*:*:*:*:*:*
Vendors & Products Trendnet tew-827dru

Wed, 19 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Trendnet
Trendnet tew-827dru Firmware
CPEs cpe:2.3:o:trendnet:tew-827dru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Trendnet
Trendnet tew-827dru Firmware
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-03-19T15:45:44.553Z

Reserved: 2024-05-30T00:00:00.000Z

Link: CVE-2024-36729

cve-icon Vulnrichment

Updated: 2024-08-02T03:37:05.341Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-03T14:15:09.433

Modified: 2025-04-01T18:21:25.383

Link: CVE-2024-36729

cve-icon Redhat

No data.