TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action wizard_ipv6 with a sufficiently long reboot_type key.
Metrics
Affected Vendors & Products
References
History
Tue, 01 Apr 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Trendnet tew-827dru
|
|
CPEs | cpe:2.3:h:trendnet:tew-827dru:-:*:*:*:*:*:*:* | |
Vendors & Products |
Trendnet tew-827dru
|
Wed, 19 Mar 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Trendnet
Trendnet tew-827dru Firmware |
|
CPEs | cpe:2.3:o:trendnet:tew-827dru_firmware:*:*:*:*:*:*:*:* | |
Vendors & Products |
Trendnet
Trendnet tew-827dru Firmware |
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-19T15:45:44.553Z
Reserved: 2024-05-30T00:00:00.000Z
Link: CVE-2024-36729

Updated: 2024-08-02T03:37:05.341Z

Status : Analyzed
Published: 2024-06-03T14:15:09.433
Modified: 2025-04-01T18:21:25.383
Link: CVE-2024-36729

No data.