A vulnerability classified as problematic has been found in TRENDnet TEW-637AP and TEW-638APB 1.2.7/1.3.0.106. This affects the function sub_41DED0 of the file /bin/goahead of the component HTTP Request Handler. The manipulation leads to null pointer dereference. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
History

Tue, 15 Apr 2025 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Trendnet
Trendnet tew-637ap
Trendnet tew-637ap Firmware
Trendnet tew-638apb
Trendnet tew-638apb Firmware
CPEs cpe:2.3:h:trendnet:tew-637ap:-:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:tew-638apb:-:*:*:*:*:*:*:*
cpe:2.3:o:trendnet:tew-637ap_firmware:1.2.7:*:*:*:*:*:*:*
cpe:2.3:o:trendnet:tew-638apb_firmware:1.3.0.106:*:*:*:*:*:*:*
Vendors & Products Trendnet
Trendnet tew-637ap
Trendnet tew-637ap Firmware
Trendnet tew-638apb
Trendnet tew-638apb Firmware

Mon, 31 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 30 Mar 2025 21:15:00 +0000

Type Values Removed Values Added
Description A vulnerability classified as problematic has been found in TRENDnet TEW-637AP and TEW-638APB 1.2.7/1.3.0.106. This affects the function sub_41DED0 of the file /bin/goahead of the component HTTP Request Handler. The manipulation leads to null pointer dereference. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title TRENDnet TEW-637AP/TEW-638APB HTTP Request goahead sub_41DED0 null pointer dereference
Weaknesses CWE-404
CWE-476
References
Metrics cvssV2_0

{'score': 6.1, 'vector': 'AV:A/AC:L/Au:N/C:N/I:N/A:C'}

cvssV3_0

{'score': 6.5, 'vector': 'CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-03-31T14:28:21.693Z

Reserved: 2025-03-29T19:54:20.214Z

Link: CVE-2025-2960

cve-icon Vulnrichment

Updated: 2025-03-31T14:28:04.521Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-30T21:15:32.143

Modified: 2025-04-15T18:28:01.283

Link: CVE-2025-2960

cve-icon Redhat

No data.