In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://gist.github.com/XiaoCurry/204680035c1efffa27d14956820ad928 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
01 Apr 2025, 18:20
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:trendnet:tew-752dru_firmware:1.03b01:*:*:*:*:*:*:* cpe:2.3:h:trendnet:tew-752dru:-:*:*:*:*:*:*:* |
|
First Time |
Trendnet tew-752dru Firmware
Trendnet Trendnet tew-752dru |
|
References | () https://gist.github.com/XiaoCurry/204680035c1efffa27d14956820ad928 - Exploit, Third Party Advisory |
19 Aug 2024, 21:35
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-19 20:15
Updated : 2025-04-01 18:20
NVD link : CVE-2024-42813
Mitre link : CVE-2024-42813
JSON object : View
Products Affected
trendnet
- tew-752dru
- tew-752dru_firmware
CWE
No CWE.