In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.
Metrics
Affected Vendors & Products
References
History
Mon, 19 Aug 2024 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Trendnet
Trendnet tew-752dru Firmware |
|
Weaknesses | CWE-120 | |
CPEs | cpe:2.3:o:trendnet:tew-752dru_firmware:1.03b01:*:*:*:*:*:*:* | |
Vendors & Products |
Trendnet
Trendnet tew-752dru Firmware |
|
Metrics |
cvssV3_1
|
Mon, 19 Aug 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-08-19T00:00:00
Updated: 2024-08-19T20:19:42.764Z
Reserved: 2024-08-05T00:00:00
Link: CVE-2024-42813
Vulnrichment
Updated: 2024-08-19T20:19:16.602Z
NVD
Status : Awaiting Analysis
Published: 2024-08-19T20:15:07.147
Modified: 2024-08-20T15:44:20.567
Link: CVE-2024-42813
Redhat
No data.