First published: Tue Aug 10 2021(Updated: )
Null Pointer Deference vulnerability exists in TRENDnet TEW-755AP 1.11B03, TEW-755AP2KAC 1.11B03, TEW-821DAP2KAC 1.11B03, and TEW-825DAP 1.11B03, which could let a remote malicious user cause a denial os service by sending the POST request to apply_cgi via action do_graph_auth without login_name key.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trendnet Tew-755ap Firmware | =1.11b03 | |
TRENDnet TEW-755AP | ||
Trendnet Tew-755ap2kac Firmware | =1.11b03 | |
Trendnet Tew-755ap2kac | ||
Trendnet Tew-821dap2kac Firmware | =1.11b03 | |
Trendnet Tew-821dap2kac | ||
Trendnet Tew-825dap Firmware | =1.11b03 | |
Trendnet Tew-825dap |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28842 is a Null Pointer Deference vulnerability that exists in TRENDnet TEW-755AP, TEW-755AP2KAC, TEW-821DAP2KAC, and TEW-825DAP firmware versions 1.11B03.
CVE-2021-28842 could allow a remote malicious user to cause a denial of service by sending a POST request to apply_cgi via action do_graph_auth without the login_name key.
CVE-2021-28842 has a severity value of 7.5, which is considered high.
To fix CVE-2021-28842, users should update their TRENDnet TEW-755AP, TEW-755AP2KAC, TEW-821DAP2KAC, and TEW-825DAP firmware to version 1.11B04 or later.
More information about CVE-2021-28842 can be found at the following reference: [link](https://github.com/zyw-200/EQUAFL/blob/main/TRENDnet%20ticket.pdf).