In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.
References
Configurations
No configuration.
History
20 Aug 2024, 15:44
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
19 Aug 2024, 21:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-120 |
19 Aug 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-19 20:15
Updated : 2024-08-20 15:44
NVD link : CVE-2024-42813
Mitre link : CVE-2024-42813
CVE.ORG link : CVE-2024-42813
JSON object : View
Products Affected
No product.
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')