First published: Fri Jun 14 2024(Updated: )
TRENDnet TEW-814DAP v1_(FW1.01B01) was discovered to contain a hardcoded password vulnerability in /etc/shadow.sample, which allows attackers to log in as root.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TRENDnet TEW-815DAP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37644 has been classified with a high severity due to its potential to allow attackers to gain unauthorized root access.
To mitigate CVE-2024-37644, it is recommended to update your TRENDnet TEW-814DAP firmware to the latest version where the vulnerability is patched.
CVE-2024-37644 is a hardcoded password vulnerability found in the /etc/shadow.sample file.
Any users or organizations utilizing the TRENDnet TEW-814DAP with the specified firmware version are affected by CVE-2024-37644.
Attackers exploiting CVE-2024-37644 can log in as root, gaining full control over the affected device.