In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.
History

Tue, 01 Apr 2025 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Trendnet tew-752dru
CPEs cpe:2.3:h:trendnet:tew-752dru:-:*:*:*:*:*:*:*
Vendors & Products Trendnet tew-752dru

Mon, 19 Aug 2024 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Trendnet
Trendnet tew-752dru Firmware
Weaknesses CWE-120
CPEs cpe:2.3:o:trendnet:tew-752dru_firmware:1.03b01:*:*:*:*:*:*:*
Vendors & Products Trendnet
Trendnet tew-752dru Firmware
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 19 Aug 2024 20:00:00 +0000

Type Values Removed Values Added
Description In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-19T20:19:42.764Z

Reserved: 2024-08-05T00:00:00

Link: CVE-2024-42813

cve-icon Vulnrichment

Updated: 2024-08-19T20:19:16.602Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-19T20:15:07.147

Modified: 2025-04-01T18:20:43.097

Link: CVE-2024-42813

cve-icon Redhat

No data.