Impact
A stack-based buffer overflow exists in the /ping_response.cgi handler of the TRENDnet TEW-632BRP firmware 1.010B32. By sending a crafted ping_ipaddr parameter in an HTTP POST request, an attacker can overwrite memory on the stack, potentially allowing execution of arbitrary code or a denial of service. The flaw originates from insufficient bounds checking on the user‑supplied argument and directly leads to memory corruption.
Affected Systems
The vulnerability is present in the TRENDnet TEW‑632BRP router running firmware 1.010B32. No other devices or versions are explicitly listed. The affected component is the HTTP POST request handler for ping_response.cgi.
Risk and Exploitability
The CVSS score of 8.6 indicates a high severity vulnerability. The EPSS score is below 1%, suggesting a low probability of exploitation currently, and the vulnerability is not catalogued in CISA's KEV list. Nevertheless, the exploit is publicly available, and the attack can be launched remotely from outside the network by submitting a malicious POST request to /ping_response.cgi. Administrators should treat this as a critical security risk if the device remains exposed.
OpenCVE Enrichment