The boa httpd of Trendnet TEW-820AP 1.01.B01 has a stack overflow vulnerability in /boafrm/formIPv6Addr, /boafrm/formIpv6Setup, /boafrm/formDnsv6. The reason is that the check of ipv6 address is not sufficient, which allows attackers to construct payloads for attacks.
References
| Link | Resource |
|---|---|
| https://github.com/ixout/iotVuls/blob/main/Trendnet/TEW_820/report.md | Exploit Third Party Advisory |
| https://www.trendnet.com/support/support-detail.asp?prod=100_TEW-820AP | Broken Link Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2024-11-11 19:15
Updated : 2025-04-01 18:21
NVD link : CVE-2024-50667
Mitre link : CVE-2024-50667
CVE.ORG link : CVE-2024-50667
JSON object : View
Products Affected
trendnet
- tew-820ap_firmware
- tew-820ap
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
