TRENDnet DIR-822 Rev. B Firmware Vulnerability: LAN-Side Unauthenticated Remote Code Execution
CVE-2024-25331

9.3CRITICAL

Key Information:

Vendor

TRENDnet

Vendor
CVE Published:
12 March 2024

Badges

๐Ÿ“ฐ News Worthy

What is CVE-2024-25331?

The DIR-822 Rev. B and DIR-822-CA Rev. B firmware versions have been found to contain a serious security flaw that allows unauthenticated users to execute arbitrary code remotely via a LAN-side interface. This vulnerability arises from a stack-based buffer overflow in the HNAP (Home Network Administration Protocol) services of the affected firmware versions. Users are advised to apply necessary patches and updates as soon as available to mitigate potential risks associated with this vulnerability.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

News Articles

CVE-2024-25331 : D-LINK DIR-822 REV B/DIR-822-CA REV B HNAP STACK-BASED OVERFLOW - Cloud WAF

CVE-2024-25331 : DIR-822 Rev. B Firmware v2.02KRB09 and DIR-822-CA Rev. B Firmware v2.03WWb01 suffer from a LAN-Side Unauthenticated Remote Code Execution (RCE) vulnerability elevated from HNAP Stack-Based Buffer Overflow.

References

CVSS V3.1

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • ๐Ÿ“ฐ

    First article discovered by prophaze.com

  • Vulnerability published

  • Vulnerability Reserved

.