Description
A vulnerability was detected in TRENDnet TEW-632BRP 1.010B32. This affects an unknown part of the file /ping_response.cgi of the component HTTP POST Request Handler. The manipulation of the argument ping_ipaddr results in stack-based buffer overflow. The attack may be performed from remote. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-15
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution via stack-based buffer overflow
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow exists in the /ping_response.cgi handler of the TRENDnet TEW-632BRP firmware 1.010B32. By sending a crafted ping_ipaddr parameter in an HTTP POST request, an attacker can overwrite memory on the stack, potentially allowing execution of arbitrary code or a denial of service. The flaw originates from insufficient bounds checking on the user‑supplied argument and directly leads to memory corruption.

Affected Systems

The vulnerability is present in the TRENDnet TEW‑632BRP router running firmware 1.010B32. No other devices or versions are explicitly listed. The affected component is the HTTP POST request handler for ping_response.cgi.

Risk and Exploitability

The CVSS score of 8.6 indicates a high severity vulnerability. The EPSS score is below 1%, suggesting a low probability of exploitation currently, and the vulnerability is not catalogued in CISA's KEV list. Nevertheless, the exploit is publicly available, and the attack can be launched remotely from outside the network by submitting a malicious POST request to /ping_response.cgi. Administrators should treat this as a critical security risk if the device remains exposed.

Generated by OpenCVE AI on March 21, 2026 at 14:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for and install any TRENDnet firmware update that addresses the buffer overflow.
  • If no firmware update is available, block or restrict access to the /ping_response.cgi URL using firewall or router rules.
  • Disable remote management features that expose the router to the internet, or isolate the device on a separate, isolated network segment.
  • Consider replacing the device with a vendor that provides timely security updates.
  • Monitor network traffic for anomalous POST requests to /ping_response.cgi and set up alerts if possible.

Generated by OpenCVE AI on March 21, 2026 at 14:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Trendnet tew-632brp
Vendors & Products Trendnet tew-632brp

Sun, 15 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in TRENDnet TEW-632BRP 1.010B32. This affects an unknown part of the file /ping_response.cgi of the component HTTP POST Request Handler. The manipulation of the argument ping_ipaddr results in stack-based buffer overflow. The attack may be performed from remote. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title TRENDnet TEW-632BRP HTTP POST Request ping_response.cgi stack-based overflow
First Time appeared Trendnet
Trendnet tew-632brp Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:trendnet:tew-632brp_firmware:*:*:*:*:*:*:*:*
Vendors & Products Trendnet
Trendnet tew-632brp Firmware
References
Metrics cvssV2_0

{'score': 8.3, 'vector': 'AV:N/AC:L/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.2, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Trendnet Tew-632brp Tew-632brp Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-16T15:36:25.987Z

Reserved: 2026-03-14T12:59:53.544Z

Link: CVE-2026-4172

cve-icon Vulnrichment

Updated: 2026-03-16T15:36:23.271Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-16T14:19:57.397

Modified: 2026-03-16T14:53:07.390

Link: CVE-2026-4172

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T14:01:56Z

Weaknesses