The TRENDnet TI-PG1284i switch(hw v2.0R) prior to version 2.0.2.S0 suffers from an integer underflow vulnerability. This vulnerability exists in its lldp related component. Due to lack of proper validation on length field of ChassisID TLV, by sending a crafted lldp packet to the device, integer underflow would occur and the negative number will be passed to memcpy() later, which may cause buffer overflow or invalid memory access.
References
Link | Resource |
---|---|
https://www.trendnet.com/support/view.asp?cat=4&id=81 | Patch Vendor Advisory |
https://www.trendnet.com/support/view.asp?cat=4&id=81 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
History
21 Nov 2024, 06:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.trendnet.com/support/view.asp?cat=4&id=81 - Patch, Vendor Advisory |
12 Jul 2022, 17:42
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-20 |
20 May 2022, 14:49
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
CWE | CWE-191 | |
CPE | cpe:2.3:h:trendnet:ti-pg541i:-:*:*:*:*:*:*:* cpe:2.3:h:trendnet:teg-30102ws:-:*:*:*:*:*:*:* cpe:2.3:o:trendnet:teg-30102ws_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:trendnet:ti-pg1284i:2.0r:*:*:*:*:*:*:* cpe:2.3:o:trendnet:ti-g160i_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:trendnet:ti-g642i:-:*:*:*:*:*:*:* cpe:2.3:o:trendnet:ti-pg102i_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:trendnet:tpe-30102ws:-:*:*:*:*:*:*:* cpe:2.3:o:trendnet:ti-pg541i_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:trendnet:ti-g642i_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:trendnet:ti-g102i:-:*:*:*:*:*:*:* cpe:2.3:h:trendnet:ti-rp262i:-:*:*:*:*:*:*:* cpe:2.3:o:trendnet:ti-g102i_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:trendnet:ti-pg102i:-:*:*:*:*:*:*:* cpe:2.3:o:trendnet:ti-rp262i_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:trendnet:tpe-30102ws_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:trendnet:ti-g160i:-:*:*:*:*:*:*:* cpe:2.3:o:trendnet:ti-pg1284i_firmware:*:*:*:*:*:*:*:* |
|
References | (MISC) https://www.trendnet.com/support/view.asp?cat=4&id=81 - Patch, Vendor Advisory |
11 May 2022, 18:33
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-05-11 18:15
Updated : 2024-11-21 06:08
NVD link : CVE-2021-33316
Mitre link : CVE-2021-33316
CVE.ORG link : CVE-2021-33316
JSON object : View
Products Affected
trendnet
- ti-pg1284i
- ti-g642i_firmware
- ti-g102i_firmware
- ti-pg102i_firmware
- ti-pg1284i_firmware
- ti-g160i
- tpe-30102ws
- ti-g102i
- teg-30102ws_firmware
- ti-rp262i_firmware
- ti-rp262i
- tpe-30102ws_firmware
- ti-g642i
- ti-pg541i_firmware
- ti-g160i_firmware
- teg-30102ws
- ti-pg102i
- ti-pg541i
CWE
CWE-20
Improper Input Validation