In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.
                
            References
                    | Link | Resource | 
|---|---|
| https://gist.github.com/XiaoCurry/204680035c1efffa27d14956820ad928 | Exploit Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    01 Apr 2025, 18:20
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:h:trendnet:tew-752dru:-:*:*:*:*:*:*:* cpe:2.3:o:trendnet:tew-752dru_firmware:1.03b01:*:*:*:*:*:*:* | |
| References | () https://gist.github.com/XiaoCurry/204680035c1efffa27d14956820ad928 - Exploit, Third Party Advisory | |
| First Time | Trendnet Trendnet tew-752dru Firmware Trendnet tew-752dru | 
Information
                Published : 2024-08-19 20:15
Updated : 2025-04-01 18:20
NVD link : CVE-2024-42813
Mitre link : CVE-2024-42813
CVE.ORG link : CVE-2024-42813
JSON object : View
Products Affected
                trendnet
- tew-752dru_firmware
- tew-752dru
CWE
                
                    
                        
                        CWE-120
                        
            Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
