Description
A vulnerability classified as problematic has been found in TRENDnet TEW-637AP and TEW-638APB 1.2.7/1.3.0.106. This affects the function sub_41DED0 of the file /bin/goahead of the component HTTP Request Handler. The manipulation leads to null pointer dereference. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2025-03-30
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-8688 A vulnerability classified as problematic has been found in TRENDnet TEW-637AP and TEW-638APB 1.2.7/1.3.0.106. This affects the function sub_41DED0 of the file /bin/goahead of the component HTTP Request Handler. The manipulation leads to null pointer dereference. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00223}

epss

{'score': 0.00191}


Tue, 15 Apr 2025 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Trendnet
Trendnet tew-637ap
Trendnet tew-637ap Firmware
Trendnet tew-638apb
Trendnet tew-638apb Firmware
CPEs cpe:2.3:h:trendnet:tew-637ap:-:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:tew-638apb:-:*:*:*:*:*:*:*
cpe:2.3:o:trendnet:tew-637ap_firmware:1.2.7:*:*:*:*:*:*:*
cpe:2.3:o:trendnet:tew-638apb_firmware:1.3.0.106:*:*:*:*:*:*:*
Vendors & Products Trendnet
Trendnet tew-637ap
Trendnet tew-637ap Firmware
Trendnet tew-638apb
Trendnet tew-638apb Firmware

Mon, 31 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 30 Mar 2025 21:15:00 +0000

Type Values Removed Values Added
Description A vulnerability classified as problematic has been found in TRENDnet TEW-637AP and TEW-638APB 1.2.7/1.3.0.106. This affects the function sub_41DED0 of the file /bin/goahead of the component HTTP Request Handler. The manipulation leads to null pointer dereference. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title TRENDnet TEW-637AP/TEW-638APB HTTP Request goahead sub_41DED0 null pointer dereference
Weaknesses CWE-404
CWE-476
References
Metrics cvssV2_0

{'score': 6.1, 'vector': 'AV:A/AC:L/Au:N/C:N/I:N/A:C'}

cvssV3_0

{'score': 6.5, 'vector': 'CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Trendnet Tew-637ap Tew-637ap Firmware Tew-638apb Tew-638apb Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-03-31T14:28:21.693Z

Reserved: 2025-03-29T19:54:20.214Z

Link: CVE-2025-2960

cve-icon Vulnrichment

Updated: 2025-03-31T14:28:04.521Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-30T21:15:32.143

Modified: 2025-04-15T18:28:01.283

Link: CVE-2025-2960

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses