Impact
A vulnerability in the sub_420A78 function of the apply_sec.cgi component allows an attacker to inject arbitrary client‑side script through the Language parameter. The injected script executes in the victim’s browser context when the vulnerable page is loaded, enabling the attacker to manipulate the web page or perform actions on behalf of the user.
Affected Systems
Firmware versions 1.010B01 and 1.04B01 of the TRENDnet TEW‑824DRU router are affected. The corresponding Common Platform Enumeration string is cpe:2.3:o:trendnet:tew-824dru_firmware:*:*:*:*:*:*:*:*.
Risk and Exploitability
The CVSS score of 5.1 indicates moderate severity. EPSS information is not available and the vulnerability is not listed in the CISA KEV catalog. The description states that the attack can be launched remotely; it is inferred that authentication is not required for exploitation. A publicly available exploit could be deployed against exposed devices, raising the likelihood of real‑world exploitation.
OpenCVE Enrichment