CVE-2024-42813

In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.
References
Link Resource
https://gist.github.com/XiaoCurry/204680035c1efffa27d14956820ad928 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:trendnet:tew-752dru_firmware:1.03b01:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:tew-752dru:-:*:*:*:*:*:*:*

History

01 Apr 2025, 18:20

Type Values Removed Values Added
References () https://gist.github.com/XiaoCurry/204680035c1efffa27d14956820ad928 - () https://gist.github.com/XiaoCurry/204680035c1efffa27d14956820ad928 - Exploit, Third Party Advisory
First Time Trendnet tew-752dru Firmware
Trendnet
Trendnet tew-752dru
CPE cpe:2.3:o:trendnet:tew-752dru_firmware:1.03b01:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:tew-752dru:-:*:*:*:*:*:*:*

20 Aug 2024, 15:44

Type Values Removed Values Added
Summary
  • (es) En TRENDnet TEW-752DRU FW1.03B01, existe una vulnerabilidad de desbordamiento del búfer debido a la falta de verificación de longitud para el campo de servicio en gena.cgi. Los atacantes que explotan con éxito esta vulnerabilidad pueden provocar que el dispositivo de destino remoto falle o ejecute comandos arbitrarios.

19 Aug 2024, 21:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-120

19 Aug 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-19 20:15

Updated : 2025-04-01 18:20


NVD link : CVE-2024-42813

Mitre link : CVE-2024-42813

CVE.ORG link : CVE-2024-42813


JSON object : View

Products Affected

trendnet

  • tew-752dru_firmware
  • tew-752dru
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')