Submit #521727: TRENDnet wi-fi access point TEW_637AP_V2_FW1.3.0.106/FW_TEW_638APB_V2_1.2.7 NULL Pointer Dereferenceinfo

TitleTRENDnet wi-fi access point TEW_637AP_V2_FW1.3.0.106/FW_TEW_638APB_V2_1.2.7 NULL Pointer Dereference
DescriptionWe discovered two null pointer reference vulnerabilities that can directly cause a web server in a remote device to crash without authentication, leading to a denial of service attack. The vulnerability occurs in the `/bin/goahead` binary. When `httpd`receives a carefully constructed HTTP request, it will crash and exit due to a null pointer reference. You can Vulnerability Description and PoC:https://docs.google.com/document/d/17FadWn-UWXjvcYNzDI4JRjag-lGUU9pJ/edit#heading=h.gjdgxs And the vendor has confirmed the vulnerability. The Vendor Security Announcement is as follows:https://www.trendnet.com/support/view.asp?cat=4&id=100 Discoverers Zhongwei Gu,Qin Chuan
Source⚠️ https://docs.google.com/document/d/17FadWn-UWXjvcYNzDI4JRjag-lGUU9pJ/edit#heading=h.gjdgxs
User
 zhongwei gu (UID 82883)
Submission03/17/2025 14:51 (1 Year ago)
Moderation03/29/2025 20:54 (12 days later)
StatusAccepted
VulDB entry302013 [TRENDnet TEW-637AP/TEW-638APB 1.2.7/1.3.0.106 HTTP Request /bin/goahead sub_41DED0 null pointer dereference]
Points20

Might our Artificial Intelligence support you?

Check our Alexa App!