Enviar #521727: TRENDnet wi-fi access point TEW_637AP_V2_FW1.3.0.106/FW_TEW_638APB_V2_1.2.7 NULL Pointer Dereferenceinformación

TítuloTRENDnet wi-fi access point TEW_637AP_V2_FW1.3.0.106/FW_TEW_638APB_V2_1.2.7 NULL Pointer Dereference
DescripciónWe discovered two null pointer reference vulnerabilities that can directly cause a web server in a remote device to crash without authentication, leading to a denial of service attack. The vulnerability occurs in the `/bin/goahead` binary. When `httpd`receives a carefully constructed HTTP request, it will crash and exit due to a null pointer reference. You can Vulnerability Description and PoC:https://docs.google.com/document/d/17FadWn-UWXjvcYNzDI4JRjag-lGUU9pJ/edit#heading=h.gjdgxs And the vendor has confirmed the vulnerability. The Vendor Security Announcement is as follows:https://www.trendnet.com/support/view.asp?cat=4&id=100 Discoverers Zhongwei Gu,Qin Chuan
Fuente⚠️ https://docs.google.com/document/d/17FadWn-UWXjvcYNzDI4JRjag-lGUU9pJ/edit#heading=h.gjdgxs
Usuario
 zhongwei gu (UID 82883)
Sumisión2025-03-17 14:51 (hace 1 Año)
Moderación2025-03-29 20:54 (12 days later)
EstadoAceptado
Entrada de VulDB302013 [TRENDnet TEW-637AP/TEW-638APB 1.2.7/1.3.0.106 HTTP Request /bin/goahead sub_41DED0 denegación de servicio]
Puntos20

Do you need the next level of professionalism?

Upgrade your account now!