The TRENDnet TI-PG1284i switch(hw v2.0R) prior to version 2.0.2.S0 suffers from an integer underflow vulnerability. This vulnerability exists in its lldp related component. Due to lack of proper validation on length field of ChassisID TLV, by sending a crafted lldp packet to the device, integer underflow would occur and the negative number will be passed to memcpy() later, which may cause buffer overflow or invalid memory access.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.trendnet.com/support/view.asp?cat=4&id=81 | Patch Vendor Advisory | 
| https://www.trendnet.com/support/view.asp?cat=4&id=81 | Patch Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
Configuration 2 (hide)
| AND | 
 
 | 
Configuration 3 (hide)
| AND | 
 
 | 
Configuration 4 (hide)
| AND | 
 
 | 
Configuration 5 (hide)
| AND | 
 
 | 
Configuration 6 (hide)
| AND | 
 
 | 
Configuration 7 (hide)
| AND | 
 
 | 
Configuration 8 (hide)
| AND | 
 
 | 
Configuration 9 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 06:08
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.trendnet.com/support/view.asp?cat=4&id=81 - Patch, Vendor Advisory | 
12 Jul 2022, 17:42
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-20 | 
20 May 2022, 14:49
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : 7.5 v3 : 9.8 | 
| CWE | CWE-191 | |
| CPE | cpe:2.3:h:trendnet:ti-pg541i:-:*:*:*:*:*:*:* cpe:2.3:h:trendnet:teg-30102ws:-:*:*:*:*:*:*:* cpe:2.3:o:trendnet:teg-30102ws_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:trendnet:ti-pg1284i:2.0r:*:*:*:*:*:*:* cpe:2.3:o:trendnet:ti-g160i_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:trendnet:ti-g642i:-:*:*:*:*:*:*:* cpe:2.3:o:trendnet:ti-pg102i_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:trendnet:tpe-30102ws:-:*:*:*:*:*:*:* cpe:2.3:o:trendnet:ti-pg541i_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:trendnet:ti-g642i_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:trendnet:ti-g102i:-:*:*:*:*:*:*:* cpe:2.3:h:trendnet:ti-rp262i:-:*:*:*:*:*:*:* cpe:2.3:o:trendnet:ti-g102i_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:trendnet:ti-pg102i:-:*:*:*:*:*:*:* cpe:2.3:o:trendnet:ti-rp262i_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:trendnet:tpe-30102ws_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:trendnet:ti-g160i:-:*:*:*:*:*:*:* cpe:2.3:o:trendnet:ti-pg1284i_firmware:*:*:*:*:*:*:*:* | |
| References | (MISC) https://www.trendnet.com/support/view.asp?cat=4&id=81 - Patch, Vendor Advisory | 
11 May 2022, 18:33
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2022-05-11 18:15
Updated : 2024-11-21 06:08
NVD link : CVE-2021-33316
Mitre link : CVE-2021-33316
CVE.ORG link : CVE-2021-33316
JSON object : View
Products Affected
                trendnet
- teg-30102ws_firmware
- ti-pg1284i
- ti-g642i
- ti-g102i_firmware
- ti-rp262i_firmware
- ti-g160i_firmware
- tpe-30102ws
- ti-pg541i_firmware
- ti-rp262i
- ti-g642i_firmware
- teg-30102ws
- ti-g102i
- ti-pg102i
- ti-pg102i_firmware
- tpe-30102ws_firmware
- ti-pg541i
- ti-pg1284i_firmware
- ti-g160i
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
