CVE-2024-36729
June 3, 2024, 2:46 p.m.
None
No Score
Description
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action wizard_ipv6 with a sufficiently long reboot_type key.
Product(s) Impacted
Product | Versions |
---|---|
TRENDnet TEW-827DRU |
|
TRENDnet TEW-827DRU |
|
Weaknesses
Common security weaknesses mapped to this vulnerability.
Tags
Timeline
Published: June 3, 2024, 2:15 p.m.
Last Modified: June 3, 2024, 2:46 p.m.
Last Modified: June 3, 2024, 2:46 p.m.
Status : Awaiting Analysis
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
cve@mitre.org
*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.