First published: Tue Aug 10 2021(Updated: )
Null Pointer Dereference vulnerability exists in TRENDnet TEW-755AP 1.11B03, TEW-755AP2KAC 1.11B03, TEW-821DAP2KAC 1.11B03, and TEW-825DAP 1.11B03 by sending the POST request to apply_cgi via a do_graph_auth action without a session_id key.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trendnet Tew-755ap Firmware | =1.11b03 | |
TRENDnet TEW-755AP | ||
Trendnet Tew-755ap2kac Firmware | =1.11b03 | |
Trendnet Tew-755ap2kac | ||
Trendnet Tew-821dap2kac Firmware | =1.11b03 | |
Trendnet Tew-821dap2kac | ||
Trendnet Tew-825dap Firmware | =1.11b03 | |
Trendnet Tew-825dap |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28844 is a null pointer dereference vulnerability that exists in TRENDnet TEW-755AP, TEW-755AP2KAC, TEW-821DAP2KAC, and TEW-825DAP firmware versions 1.11B03.
CVE-2021-28844 allows an attacker to cause a null pointer dereference by sending a specially crafted POST request to apply_cgi without a session_id key.
CVE-2021-28844 has a severity rating of 7.5 (high).
Yes, TRENDnet TEW-755AP2KAC firmware version 1.11B03 is affected by CVE-2021-28844.
To fix CVE-2021-28844, it is recommended to update the affected firmware versions to a patched version provided by TRENDnet.