CVE-2025-2960

A vulnerability classified as problematic has been found in TRENDnet TEW-637AP and TEW-638APB 1.2.7/1.3.0.106. This affects the function sub_41DED0 of the file /bin/goahead of the component HTTP Request Handler. The manipulation leads to null pointer dereference. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:trendnet:tew-637ap_firmware:1.2.7:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:tew-637ap:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:trendnet:tew-638apb_firmware:1.3.0.106:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:tew-638apb:-:*:*:*:*:*:*:*

History

15 Apr 2025, 18:28

Type Values Removed Values Added
First Time Trendnet tew-638apb
Trendnet tew-638apb Firmware
Trendnet tew-637ap Firmware
Trendnet
Trendnet tew-637ap
CPE cpe:2.3:h:trendnet:tew-638apb:-:*:*:*:*:*:*:*
cpe:2.3:o:trendnet:tew-638apb_firmware:1.3.0.106:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:tew-637ap:-:*:*:*:*:*:*:*
cpe:2.3:o:trendnet:tew-637ap_firmware:1.2.7:*:*:*:*:*:*:*
References () https://docs.google.com/document/d/17FadWn-UWXjvcYNzDI4JRjag-lGUU9pJ/edit#heading=h.gjdgxs - () https://docs.google.com/document/d/17FadWn-UWXjvcYNzDI4JRjag-lGUU9pJ/edit#heading=h.gjdgxs - Exploit
References () https://drive.google.com/file/d/1SS7jsYBNl0faSOy_vH5tNn_xJJ_HA1xU/view?usp=drive_link - () https://drive.google.com/file/d/1SS7jsYBNl0faSOy_vH5tNn_xJJ_HA1xU/view?usp=drive_link - Exploit
References () https://vuldb.com/?ctiid.302013 - () https://vuldb.com/?ctiid.302013 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.302013 - () https://vuldb.com/?id.302013 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.521727 - () https://vuldb.com/?submit.521727 - Third Party Advisory, VDB Entry

01 Apr 2025, 20:26

Type Values Removed Values Added
Summary
  • (es) Se ha detectado una vulnerabilidad clasificada como problemática en TRENDnet TEW-637AP y TEW-638APB 1.2.7/1.3.0.106. Esta vulnerabilidad afecta a la función sub_41DED0 del archivo /bin/goahead del componente HTTP Request Handler. La manipulación provoca la desreferenciación de puntero nulo. Este ataque requiere acceso a la red local. Se ha hecho público el exploit y puede que sea utilizado. Se contactó al proveedor con antelación para informarle sobre esta divulgación, pero no respondió.

31 Mar 2025, 15:15

Type Values Removed Values Added
References () https://docs.google.com/document/d/17FadWn-UWXjvcYNzDI4JRjag-lGUU9pJ/edit#heading=h.gjdgxs - () https://docs.google.com/document/d/17FadWn-UWXjvcYNzDI4JRjag-lGUU9pJ/edit#heading=h.gjdgxs -

30 Mar 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-30 21:15

Updated : 2025-04-15 18:28


NVD link : CVE-2025-2960

Mitre link : CVE-2025-2960

CVE.ORG link : CVE-2025-2960


JSON object : View

Products Affected

trendnet

  • tew-638apb
  • tew-638apb_firmware
  • tew-637ap
  • tew-637ap_firmware
CWE
CWE-404

Improper Resource Shutdown or Release

CWE-476

NULL Pointer Dereference