जमा करें #521727: TRENDnet wi-fi access point TEW_637AP_V2_FW1.3.0.106/FW_TEW_638APB_V2_1.2.7 NULL Pointer Dereferenceजानकारी

शीर्षकTRENDnet wi-fi access point TEW_637AP_V2_FW1.3.0.106/FW_TEW_638APB_V2_1.2.7 NULL Pointer Dereference
विवरणWe discovered two null pointer reference vulnerabilities that can directly cause a web server in a remote device to crash without authentication, leading to a denial of service attack. The vulnerability occurs in the `/bin/goahead` binary. When `httpd`receives a carefully constructed HTTP request, it will crash and exit due to a null pointer reference. You can Vulnerability Description and PoC:https://docs.google.com/document/d/17FadWn-UWXjvcYNzDI4JRjag-lGUU9pJ/edit#heading=h.gjdgxs And the vendor has confirmed the vulnerability. The Vendor Security Announcement is as follows:https://www.trendnet.com/support/view.asp?cat=4&id=100 Discoverers Zhongwei Gu,Qin Chuan
स्रोत⚠️ https://docs.google.com/document/d/17FadWn-UWXjvcYNzDI4JRjag-lGUU9pJ/edit#heading=h.gjdgxs
उपयोगकर्ता
 zhongwei gu (UID 82883)
सबमिशन17/03/2025 02:51 PM (1 वर्ष पहले)
संयम29/03/2025 08:54 PM (12 days later)
स्थितिस्वीकृत
VulDB प्रविष्टि302013 [TRENDnet TEW-637AP/TEW-638APB 1.2.7/1.3.0.106 HTTP Request /bin/goahead sub_41DED0 सेवा अस्वीकार]
अंक20

Interested in the pricing of exploits?

See the underground prices here!