First published: Sun Mar 30 2025(Updated: )
A vulnerability classified as problematic has been found in TRENDnet TEW-637AP and TEW-638APB 1.2.7/1.3.0.106. This affects the function sub_41DED0 of the file /bin/goahead of the component HTTP Request Handler. The manipulation leads to null pointer dereference. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
TRENDnet TEW-637AP | >=1.2.7<=1.2.7 | |
TRENDnet TEW-638APB | >=1.3.0.106<=1.3.0.106 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2960 is classified as a problematic vulnerability.
To address CVE-2025-2960, users should update their TRENDnet TEW-637AP and TEW-638APB devices to the latest firmware version.
CVE-2025-2960 affects TRENDnet TEW-637AP version 1.2.7 and TRENDnet TEW-638APB version 1.3.0.106.
CVE-2025-2960 is a null pointer dereference vulnerability found in the HTTP Request Handler component.
CVE-2025-2960 requires local access for exploitation, as the vulnerability is related to local processing in the device.