In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.
Metrics
Affected Vendors & Products
References
History
Tue, 01 Apr 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Trendnet tew-752dru
|
|
CPEs | cpe:2.3:h:trendnet:tew-752dru:-:*:*:*:*:*:*:* | |
Vendors & Products |
Trendnet tew-752dru
|
Mon, 19 Aug 2024 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Trendnet
Trendnet tew-752dru Firmware |
|
Weaknesses | CWE-120 | |
CPEs | cpe:2.3:o:trendnet:tew-752dru_firmware:1.03b01:*:*:*:*:*:*:* | |
Vendors & Products |
Trendnet
Trendnet tew-752dru Firmware |
|
Metrics |
cvssV3_1
|
Mon, 19 Aug 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-19T20:19:42.764Z
Reserved: 2024-08-05T00:00:00
Link: CVE-2024-42813

Updated: 2024-08-19T20:19:16.602Z

Status : Analyzed
Published: 2024-08-19T20:15:07.147
Modified: 2025-04-01T18:20:43.097
Link: CVE-2024-42813

No data.