First published: Mon Aug 19 2024(Updated: )
In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trendnet Tew-752dru Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-42813 has been classified as a high severity vulnerability due to its potential to cause remote device crashes and execute arbitrary commands.
To fix CVE-2024-42813, update the firmware of the TRENDnet TEW-752DRU to the latest version provided by the manufacturer.
CVE-2024-42813 is caused by a buffer overflow vulnerability due to insufficient length verification in the service field of gena.cgi.
Users of the TRENDnet TEW-752DRU router running firmware version 1.03B01 are affected by CVE-2024-42813.
Attackers can exploit CVE-2024-42813 to crash the TRENDnet TEW-752DRU or execute arbitrary commands on the device.