In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.
History

Mon, 19 Aug 2024 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Trendnet
Trendnet tew-752dru Firmware
Weaknesses CWE-120
CPEs cpe:2.3:o:trendnet:tew-752dru_firmware:1.03b01:*:*:*:*:*:*:*
Vendors & Products Trendnet
Trendnet tew-752dru Firmware
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 19 Aug 2024 20:00:00 +0000

Type Values Removed Values Added
Description In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-08-19T00:00:00

Updated: 2024-08-19T20:19:42.764Z

Reserved: 2024-08-05T00:00:00

Link: CVE-2024-42813

cve-icon Vulnrichment

Updated: 2024-08-19T20:19:16.602Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-19T20:15:07.147

Modified: 2024-08-20T15:44:20.567

Link: CVE-2024-42813

cve-icon Redhat

No data.