CVE-2024-42813

In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.
References
Link Resource
https://gist.github.com/XiaoCurry/204680035c1efffa27d14956820ad928 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:trendnet:tew-752dru_firmware:1.03b01:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:tew-752dru:-:*:*:*:*:*:*:*

History

01 Apr 2025, 18:20

Type Values Removed Values Added
CPE cpe:2.3:h:trendnet:tew-752dru:-:*:*:*:*:*:*:*
cpe:2.3:o:trendnet:tew-752dru_firmware:1.03b01:*:*:*:*:*:*:*
References () https://gist.github.com/XiaoCurry/204680035c1efffa27d14956820ad928 - () https://gist.github.com/XiaoCurry/204680035c1efffa27d14956820ad928 - Exploit, Third Party Advisory
First Time Trendnet
Trendnet tew-752dru Firmware
Trendnet tew-752dru

Information

Published : 2024-08-19 20:15

Updated : 2025-04-01 18:20


NVD link : CVE-2024-42813

Mitre link : CVE-2024-42813

CVE.ORG link : CVE-2024-42813


JSON object : View

Products Affected

trendnet

  • tew-752dru
  • tew-752dru_firmware
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')