제출 #521727: TRENDnet wi-fi access point TEW_637AP_V2_FW1.3.0.106/FW_TEW_638APB_V2_1.2.7 NULL Pointer Dereference정보

제목TRENDnet wi-fi access point TEW_637AP_V2_FW1.3.0.106/FW_TEW_638APB_V2_1.2.7 NULL Pointer Dereference
설명We discovered two null pointer reference vulnerabilities that can directly cause a web server in a remote device to crash without authentication, leading to a denial of service attack. The vulnerability occurs in the `/bin/goahead` binary. When `httpd`receives a carefully constructed HTTP request, it will crash and exit due to a null pointer reference. You can Vulnerability Description and PoC:https://docs.google.com/document/d/17FadWn-UWXjvcYNzDI4JRjag-lGUU9pJ/edit#heading=h.gjdgxs And the vendor has confirmed the vulnerability. The Vendor Security Announcement is as follows:https://www.trendnet.com/support/view.asp?cat=4&id=100 Discoverers Zhongwei Gu,Qin Chuan
원천⚠️ https://docs.google.com/document/d/17FadWn-UWXjvcYNzDI4JRjag-lGUU9pJ/edit#heading=h.gjdgxs
사용자
 zhongwei gu (UID 82883)
제출2025. 03. 17. PM 02:51 (1 년도 ago)
모더레이션2025. 03. 29. PM 08:54 (12 days later)
상태수락
VulDB 항목302013 [TRENDnet TEW-637AP/TEW-638APB 1.2.7/1.3.0.106 HTTP Request /bin/goahead sub_41DED0 서비스 거부]
포인트들20

Want to know what is going to be exploited?

We predict KEV entries!