CVE-2021-33316

The TRENDnet TI-PG1284i switch(hw v2.0R) prior to version 2.0.2.S0 suffers from an integer underflow vulnerability. This vulnerability exists in its lldp related component. Due to lack of proper validation on length field of ChassisID TLV, by sending a crafted lldp packet to the device, integer underflow would occur and the negative number will be passed to memcpy() later, which may cause buffer overflow or invalid memory access.
References
Link Resource
https://www.trendnet.com/support/view.asp?cat=4&id=81 Patch Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:trendnet:ti-pg1284i_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:ti-pg1284i:2.0r:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:trendnet:ti-g102i_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:ti-g102i:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:trendnet:ti-g160i_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:ti-g160i:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:trendnet:ti-g642i_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:ti-g642i:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:trendnet:ti-pg102i_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:ti-pg102i:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:trendnet:ti-pg541i_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:ti-pg541i:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:trendnet:ti-rp262i_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:ti-rp262i:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:trendnet:teg-30102ws_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:teg-30102ws:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:trendnet:tpe-30102ws_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:tpe-30102ws:-:*:*:*:*:*:*:*

History

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-191 CWE-20

20 May 2022, 14:49

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
CWE CWE-191
CPE cpe:2.3:h:trendnet:ti-pg541i:-:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:teg-30102ws:-:*:*:*:*:*:*:*
cpe:2.3:o:trendnet:teg-30102ws_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:ti-pg1284i:2.0r:*:*:*:*:*:*:*
cpe:2.3:o:trendnet:ti-g160i_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:ti-g642i:-:*:*:*:*:*:*:*
cpe:2.3:o:trendnet:ti-pg102i_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:tpe-30102ws:-:*:*:*:*:*:*:*
cpe:2.3:o:trendnet:ti-pg541i_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:trendnet:ti-g642i_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:ti-g102i:-:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:ti-rp262i:-:*:*:*:*:*:*:*
cpe:2.3:o:trendnet:ti-g102i_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:ti-pg102i:-:*:*:*:*:*:*:*
cpe:2.3:o:trendnet:ti-rp262i_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:trendnet:tpe-30102ws_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:ti-g160i:-:*:*:*:*:*:*:*
cpe:2.3:o:trendnet:ti-pg1284i_firmware:*:*:*:*:*:*:*:*
References (MISC) https://www.trendnet.com/support/view.asp?cat=4&id=81 - (MISC) https://www.trendnet.com/support/view.asp?cat=4&id=81 - Patch, Vendor Advisory

11 May 2022, 18:33

Type Values Removed Values Added
New CVE

Information

Published : 2022-05-11 18:15

Updated : 2024-02-04 22:29


NVD link : CVE-2021-33316

Mitre link : CVE-2021-33316

CVE.ORG link : CVE-2021-33316


JSON object : View

Products Affected

trendnet

  • ti-g642i_firmware
  • tpe-30102ws
  • ti-g642i
  • ti-pg102i
  • ti-rp262i_firmware
  • ti-g102i_firmware
  • ti-g160i_firmware
  • ti-pg1284i
  • teg-30102ws_firmware
  • teg-30102ws
  • ti-pg541i
  • ti-pg1284i_firmware
  • tpe-30102ws_firmware
  • ti-rp262i
  • ti-pg541i_firmware
  • ti-g102i
  • ti-pg102i_firmware
  • ti-g160i
CWE
CWE-20

Improper Input Validation