提出 #521717: TRENDnet Router FW_TI_G102i_v1_1.0.8.S0_/FW_TI_G642i_v1_1.0.7.S0_ NULL Pointer Dereference情報

タイトルTRENDnet Router FW_TI_G102i_v1_1.0.8.S0_/FW_TI_G642i_v1_1.0.7.S0_ NULL Pointer Dereference
説明We discovered a null pointer reference vulnerability that can directly cause a web server in a remote device to crash without authentication, leading to a denial of service attack. The vulnerability occurs in the `/usr/sbin/lighttpd` binary. When `httpd`receives a carefully constructed HTTP request, it will crash and exit due to a null pointer reference. We discovered a null pointer reference vulnerability in the `/usr/sbin/lighttpd` binary that can crash a web server on a remote device without requiring authentication, resulting in a denial of service attack. The server crashes and exits when the program receives a specially crafted HTTP request. you can see Vulnerability Description and PoC:https://docs.google.com/document/d/16iWGXHpmlwJ0GAOi458YlpR56McCvDcN/edit#heading=h.gjdgxs and the vendor has confirmed the vulnerability. The Vendor Security Announcement is as follows:https://www.trendnet.com/support/view.asp?cat=4&id=100 Discoverers Zhongwei Gu, Qin Chuan
ソース⚠️ https://docs.google.com/document/d/16iWGXHpmlwJ0GAOi458YlpR56McCvDcN/edit#heading=h.gjdgxs
ユーザー
 zhongwei gu (UID 82883)
送信2025年03月17日 14:31 (1 年 ago)
モデレーション2025年03月29日 20:51 (12 days later)
ステータス承諾済み
VulDBエントリ302009 [TRENDnet TI-G102i 1.0.7.S0_ /1.0.8.S0_ HTTP Request /usr/sbin/lighttpd plugins_call_handle_uri_raw サービス拒否]
ポイント20

Do you know our Splunk app?

Download it now for free!