Submeter #521727: TRENDnet wi-fi access point TEW_637AP_V2_FW1.3.0.106/FW_TEW_638APB_V2_1.2.7 NULL Pointer Dereferenceinformação

TítuloTRENDnet wi-fi access point TEW_637AP_V2_FW1.3.0.106/FW_TEW_638APB_V2_1.2.7 NULL Pointer Dereference
DescriçãoWe discovered two null pointer reference vulnerabilities that can directly cause a web server in a remote device to crash without authentication, leading to a denial of service attack. The vulnerability occurs in the `/bin/goahead` binary. When `httpd`receives a carefully constructed HTTP request, it will crash and exit due to a null pointer reference. You can Vulnerability Description and PoC:https://docs.google.com/document/d/17FadWn-UWXjvcYNzDI4JRjag-lGUU9pJ/edit#heading=h.gjdgxs And the vendor has confirmed the vulnerability. The Vendor Security Announcement is as follows:https://www.trendnet.com/support/view.asp?cat=4&id=100 Discoverers Zhongwei Gu,Qin Chuan
Fonte⚠️ https://docs.google.com/document/d/17FadWn-UWXjvcYNzDI4JRjag-lGUU9pJ/edit#heading=h.gjdgxs
Utilizador
 zhongwei gu (UID 82883)
Submissão17/03/2025 14h51 (há 1 Ano)
Moderação29/03/2025 20h54 (12 days later)
EstadoAceite
Entrada VulDB302013 [TRENDnet TEW-637AP/TEW-638APB 1.2.7/1.3.0.106 HTTP Request /bin/goahead sub_41DED0 Negação de Serviço]
Pontos20

Want to know what is going to be exploited?

We predict KEV entries!