提交 #521725: TRENDnet wi-fi access point firmware_tew_410apbplus_1.3.06b NULL Pointer Dereference信息

标题TRENDnet wi-fi access point firmware_tew_410apbplus_1.3.06b NULL Pointer Dereference
描述We discovered a null pointer reference vulnerability that can directly cause a web server in a remote device to crash without authentication, leading to a denial of service attack. The vulnerability occurs in the `/usr/sbin/httpd` binary. When `httpd`receives a carefully constructed HTTP request, it will crash and exit due to a null pointer reference. We discovered a null pointer reference vulnerability in the `/usr/sbin/httpd` binary that can crash a web server on a remote device without requiring authentication, resulting in a denial of service attack. The server crashes and exits when the program receives a specially crafted HTTP request. You can Vulnerability Description and PoC:https://docs.google.com/document/d/1PcJZQ364MQxz1eUt6PLnWIQYTLNuJ5_3/edit#heading=h.gjdgxs And the vendor has confirmed the vulnerability. The Vendor Security Announcement is as follows:https://www.trendnet.com/support/view.asp?cat=4&id=100 Discoverers Zhongwei Gu,Qin Chuan
来源⚠️ https://docs.google.com/document/d/1PcJZQ364MQxz1eUt6PLnWIQYTLNuJ5_3/edit#heading=h.gjdgxs
用户
 zhongwei gu (UID 82883)
提交2025-03-17 14時49分 (1 年前)
管理2025-03-29 20時52分 (12 days later)
状态已接受
VulDB条目302012 [TRENDnet TEW-410APB 1.3.06b HTTP Request /usr/sbin/httpd sub_4019A0 拒绝服务]
积分20

Want to know what is going to be exploited?

We predict KEV entries!