First published: Fri Jun 14 2024(Updated: )
TRENDnet TEW-814DAP v1_(FW1.01B01) was discovered to contain a stack overflow vulnerability via the submit-url parameter at /formSysLog .
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TRENDnet TEW-815DAP | =v1_(FW1.01B01) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37645 has been classified as a high-severity vulnerability due to its stack overflow nature, which can lead to remote code execution.
To mitigate CVE-2024-37645, it is recommended to update TRENDnet TEW-814DAP to the latest firmware version that addresses this vulnerability.
CVE-2024-37645 can allow an attacker to execute arbitrary code on the device, potentially compromising network security.
There are reports indicating that CVE-2024-37645 may be actively exploited in the wild, emphasizing the need for immediate remediation.
CVE-2024-37645 is considered easily exploitable, as it can be triggered through a maliciously crafted payload sent to the vulnerable parameter.