A Format String vulnerablity exists in TRENDnet TEW-755AP 1.11B03, TEW-755AP2KAC 1.11B03, TEW-821DAP2KAC 1.11B03, and TEW-825DAP 1.11B03, which could let a remote malicious user cause a denial of service due to a logic bug at address 0x40dcd0 when calling fprintf with "%s: key len = %d, too long\n" format. The two variables seem to be put in the wrong order. The vulnerability could be triggered by sending the POST request to apply_cgi with a long and unknown key in the request body.
References
Link | Resource |
---|---|
https://github.com/zyw-200/EQUAFL/blob/main/TRENDnet%20ticket.pdf | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Information
Published : 2021-08-10 13:15
Updated : 2021-08-19 10:12
NVD link : CVE-2021-28846
Mitre link : CVE-2021-28846
JSON object : View
CWE
CWE-134
Use of Externally-Controlled Format String
Products Affected
trendnet
- tew-825dap
- tew-755ap
- tew-821dap2kac
- tew-755ap2kac
- tew-755ap2kac_firmware
- tew-755ap_firmware
- tew-821dap2kac_firmware
- tew-825dap_firmware