First published: Tue Feb 11 2025(Updated: )
Buffer overflow vulnerability in Trendnet TEG-40128 Web Smart Switch v1(1.00.023) due to the lack of length verification, which is related to the mobile access point setup operation. The attacker can directly control the remote target device by successfully exploiting this vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trendnet TEG-40128 Web Smart Switch |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-25523 is classified as a high severity vulnerability due to its potential for remote exploitation.
To fix CVE-2025-25523, update the Trendnet TEG-40128 Web Smart Switch to the latest firmware version that addresses this buffer overflow vulnerability.
CVE-2025-25523 affects the Trendnet TEG-40128 Web Smart Switch version 1 (1.00.023) due to improper length verification during mobile access point setup.
CVE-2025-25523 is a buffer overflow vulnerability that can allow an attacker to control the remote target device.
Yes, CVE-2025-25523 can be exploited remotely if the attacker successfully manipulates the vulnerable mobile access point setup process.