CVE-2024-42813

In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.
CVSS

No CVSS.

References
Link Resource
https://gist.github.com/XiaoCurry/204680035c1efffa27d14956820ad928 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:trendnet:tew-752dru_firmware:1.03b01:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:tew-752dru:-:*:*:*:*:*:*:*

History

01 Apr 2025, 18:20

Type Values Removed Values Added
CPE cpe:2.3:o:trendnet:tew-752dru_firmware:1.03b01:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:tew-752dru:-:*:*:*:*:*:*:*
First Time Trendnet tew-752dru Firmware
Trendnet
Trendnet tew-752dru
References () https://gist.github.com/XiaoCurry/204680035c1efffa27d14956820ad928 - () https://gist.github.com/XiaoCurry/204680035c1efffa27d14956820ad928 - Exploit, Third Party Advisory

19 Aug 2024, 21:35

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-19 20:15

Updated : 2025-04-01 18:20


NVD link : CVE-2024-42813

Mitre link : CVE-2024-42813


JSON object : View

Products Affected

trendnet

  • tew-752dru
  • tew-752dru_firmware
CWE

No CWE.