提交 #521717: TRENDnet Router FW_TI_G102i_v1_1.0.8.S0_/FW_TI_G642i_v1_1.0.7.S0_ NULL Pointer Dereference信息

标题TRENDnet Router FW_TI_G102i_v1_1.0.8.S0_/FW_TI_G642i_v1_1.0.7.S0_ NULL Pointer Dereference
描述We discovered a null pointer reference vulnerability that can directly cause a web server in a remote device to crash without authentication, leading to a denial of service attack. The vulnerability occurs in the `/usr/sbin/lighttpd` binary. When `httpd`receives a carefully constructed HTTP request, it will crash and exit due to a null pointer reference. We discovered a null pointer reference vulnerability in the `/usr/sbin/lighttpd` binary that can crash a web server on a remote device without requiring authentication, resulting in a denial of service attack. The server crashes and exits when the program receives a specially crafted HTTP request. you can see Vulnerability Description and PoC:https://docs.google.com/document/d/16iWGXHpmlwJ0GAOi458YlpR56McCvDcN/edit#heading=h.gjdgxs and the vendor has confirmed the vulnerability. The Vendor Security Announcement is as follows:https://www.trendnet.com/support/view.asp?cat=4&id=100 Discoverers Zhongwei Gu, Qin Chuan
来源⚠️ https://docs.google.com/document/d/16iWGXHpmlwJ0GAOi458YlpR56McCvDcN/edit#heading=h.gjdgxs
用户
 zhongwei gu (UID 82883)
提交2025-03-17 14時31分 (1 年前)
管理2025-03-29 20時51分 (12 days later)
状态已接受
VulDB条目302009 [TRENDnet TI-G102i 1.0.7.S0_ /1.0.8.S0_ HTTP Request /usr/sbin/lighttpd plugins_call_handle_uri_raw 拒绝服务]
积分20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!