In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 01 Apr 2025 18:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Trendnet tew-752dru
         | 
|
| CPEs | cpe:2.3:h:trendnet:tew-752dru:-:*:*:*:*:*:*:* | |
| Vendors & Products | 
        
        Trendnet tew-752dru
         | 
Mon, 19 Aug 2024 21:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Trendnet
         Trendnet tew-752dru Firmware  | 
|
| Weaknesses | CWE-120 | |
| CPEs | cpe:2.3:o:trendnet:tew-752dru_firmware:1.03b01:*:*:*:*:*:*:* | |
| Vendors & Products | 
        
        Trendnet
         Trendnet tew-752dru Firmware  | 
|
| Metrics | 
        
        cvssV3_1
         
 
  | 
Mon, 19 Aug 2024 20:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands. | |
| References | 
         | 
Status: PUBLISHED
Assigner: mitre
Published: 2024-08-19T00:00:00
Updated: 2024-08-19T20:19:42.764Z
Reserved: 2024-08-05T00:00:00
Link: CVE-2024-42813
Updated: 2024-08-19T20:19:16.602Z
Status : Analyzed
Published: 2024-08-19T20:15:07.147
Modified: 2025-04-01T18:20:43.097
Link: CVE-2024-42813
No data.
ReportizFlow