CVE-2024-50667

The boa httpd of Trendnet TEW-820AP 1.01.B01 has a stack overflow vulnerability in /boafrm/formIPv6Addr, /boafrm/formIpv6Setup, /boafrm/formDnsv6. The reason is that the check of ipv6 address is not sufficient, which allows attackers to construct payloads for attacks.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:trendnet:tew-820ap_firmware:1.01.b01:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:tew-820ap:-:*:*:*:*:*:*:*

History

01 Apr 2025, 18:21

Type Values Removed Values Added
CPE cpe:2.3:o:trendnet:tew-820ap_firmware:1.01.b01:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:tew-820ap:-:*:*:*:*:*:*:*
First Time Trendnet
Trendnet tew-820ap Firmware
Trendnet tew-820ap
References () https://github.com/ixout/iotVuls/blob/main/Trendnet/TEW_820/report.md - () https://github.com/ixout/iotVuls/blob/main/Trendnet/TEW_820/report.md - Exploit, Third Party Advisory
References () https://www.trendnet.com/support/support-detail.asp?prod=100_TEW-820AP - () https://www.trendnet.com/support/support-detail.asp?prod=100_TEW-820AP - Broken Link, Vendor Advisory

Information

Published : 2024-11-11 19:15

Updated : 2025-04-01 18:21


NVD link : CVE-2024-50667

Mitre link : CVE-2024-50667

CVE.ORG link : CVE-2024-50667


JSON object : View

Products Affected

trendnet

  • tew-820ap_firmware
  • tew-820ap
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')