Логотип exploitDog
bind:CVE-2024-42813
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-42813

Количество 2

Количество 2

nvd логотип

CVE-2024-42813

больше 1 года назад

In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-xj37-6j2f-32m7

больше 1 года назад

In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-42813

In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.

CVSS3: 9.8
0%
Низкий
больше 1 года назад
github логотип
GHSA-xj37-6j2f-32m7

In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.

CVSS3: 9.8
0%
Низкий
больше 1 года назад

Уязвимостей на страницу