The boa httpd of Trendnet TEW-820AP 1.01.B01 has a stack overflow vulnerability in /boafrm/formIPv6Addr, /boafrm/formIpv6Setup, /boafrm/formDnsv6. The reason is that the check of ipv6 address is not sufficient, which allows attackers to construct payloads for attacks.
References
Link | Resource |
---|---|
https://github.com/ixout/iotVuls/blob/main/Trendnet/TEW_820/report.md | Exploit Third Party Advisory |
https://www.trendnet.com/support/support-detail.asp?prod=100_TEW-820AP | Broken Link Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
01 Apr 2025, 18:21
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:trendnet:tew-820ap_firmware:1.01.b01:*:*:*:*:*:*:* cpe:2.3:h:trendnet:tew-820ap:-:*:*:*:*:*:*:* |
|
First Time |
Trendnet
Trendnet tew-820ap Firmware Trendnet tew-820ap |
|
References | () https://github.com/ixout/iotVuls/blob/main/Trendnet/TEW_820/report.md - Exploit, Third Party Advisory | |
References | () https://www.trendnet.com/support/support-detail.asp?prod=100_TEW-820AP - Broken Link, Vendor Advisory |
Information
Published : 2024-11-11 19:15
Updated : 2025-04-01 18:21
NVD link : CVE-2024-50667
Mitre link : CVE-2024-50667
CVE.ORG link : CVE-2024-50667
JSON object : View
Products Affected
trendnet
- tew-820ap_firmware
- tew-820ap
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')