First published: Mon Nov 11 2024(Updated: )
The boa httpd of Trendnet TEW-820AP 1.01.B01 has a stack overflow vulnerability in /boafrm/formIPv6Addr, /boafrm/formIpv6Setup, /boafrm/formDnsv6. The reason is that the check of ipv6 address is not sufficient, which allows attackers to construct payloads for attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TRENDnet TEW-820AP | ||
All of | ||
TRENDnet TEW-820AP | =1.01.b01 | |
TRENDnet TEW-820AP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50667 has been classified as a medium severity vulnerability due to its potential for stack overflow attacks.
To mitigate CVE-2024-50667, update the Trendnet TEW-820AP firmware to the latest version provided by Trendnet.
CVE-2024-50667 specifically affects the Trendnet TEW-820AP model running firmware version 1.01.B01.
Exploitation of CVE-2024-50667 could lead to arbitrary code execution or denial of service due to stack overflow.
Attackers can exploit CVE-2024-50667 by sending specially crafted IPv6 address payloads to the vulnerable endpoints.