First published: Mon Jan 27 2025(Updated: )
TRENDnet TEW-632BRP v1.010B31 devices have an OS command injection vulnerability in the CGl interface "ntp_sync.cgi",which allows remote attackers to execute arbitrary commands via parameter "ntp_server" passed to the "ntp_sync.cgi" binary through a POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TRENDnet TEW-632BRP firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-57590 is rated as a high severity vulnerability due to its OS command injection capabilities.
To mitigate CVE-2024-57590, update the firmware of the TRENDnet TEW-632BRP device to the latest version provided by the vendor.
CVE-2024-57590 is classified as an OS command injection vulnerability.
CVE-2024-57590 affects TRENDnet TEW-632BRP devices running firmware version v1.010B31.
Attackers can execute arbitrary commands on affected devices by exploiting the OS command injection in the ntp_sync.cgi interface.