The boa httpd of Trendnet TEW-820AP 1.01.B01 has a stack overflow vulnerability in /boafrm/formIPv6Addr, /boafrm/formIpv6Setup, /boafrm/formDnsv6. The reason is that the check of ipv6 address is not sufficient, which allows attackers to construct payloads for attacks.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/ixout/iotVuls/blob/main/Trendnet/TEW_820/report.md | Exploit Third Party Advisory | 
| https://www.trendnet.com/support/support-detail.asp?prod=100_TEW-820AP | Broken Link Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    01 Apr 2025, 18:21
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:h:trendnet:tew-820ap:-:*:*:*:*:*:*:* cpe:2.3:o:trendnet:tew-820ap_firmware:1.01.b01:*:*:*:*:*:*:* | |
| References | () https://github.com/ixout/iotVuls/blob/main/Trendnet/TEW_820/report.md - Exploit, Third Party Advisory | |
| References | () https://www.trendnet.com/support/support-detail.asp?prod=100_TEW-820AP - Broken Link, Vendor Advisory | |
| First Time | Trendnet Trendnet tew-820ap Firmware Trendnet tew-820ap | 
12 Nov 2024, 17:35
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 9.8 | 
| CWE | CWE-120 | 
12 Nov 2024, 13:55
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
11 Nov 2024, 19:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-11-11 19:15
Updated : 2025-04-01 18:21
NVD link : CVE-2024-50667
Mitre link : CVE-2024-50667
CVE.ORG link : CVE-2024-50667
JSON object : View
Products Affected
                trendnet
- tew-820ap_firmware
- tew-820ap
CWE
                
                    
                        
                        CWE-120
                        
            Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
