CVE-2024-42813

Aug. 19, 2024, 9:35 p.m.

Received
CVE has been recently published to the CVE List and has been received by the NVD.

Products

TRENDnet TEW-752DRU

  • FW1.03B01

Source

cve@mitre.org

Tags

CVE-2024-42813 details

Published : Aug. 19, 2024, 8:15 p.m.
Last Modified : Aug. 19, 2024, 9:35 p.m.

Description

In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.

CVSS Score

1 2 3 4 5 6 7 8 9.8 10

Weakness

Weakness Name Description
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.

CVSS Data

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

Base Score

9.8

Exploitability Score

3.9

Impact Score

5.9

Base Severity

CRITICAL

This website uses the NVD API, but is not approved or certified by it.