Stack-based Buffer Overflow in TRENDnet TEW-827DRU Devices
CVE-2024-36729

6.3MEDIUM

Key Information:

Vendor

TRENDnet

Vendor
CVE Published:
3 June 2024

What is CVE-2024-36729?

TRENDnet TEW-827DRU devices running firmware version 2.06B04 are susceptible to a stack-based buffer overflow within the ssi binary. This vulnerability occurs when an authenticated user interacts with the device's web interface via the apply.cgi endpoint and sends a specially crafted POST request to the wizard_ipv6 action. By supplying an excessively long reboot_type key, an attacker can exploit this flaw to execute arbitrary code on the device, posing potential risks to the integrity and security of the system.

References

CVSS V3.1

Score:
6.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.