Required CVE Record Information
Description
A vulnerability classified as problematic has been found in TRENDnet TEW-637AP and TEW-638APB 1.2.7/1.3.0.106. This affects the function sub_41DED0 of the file /bin/goahead of the component HTTP Request Handler. The manipulation leads to null pointer dereference. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS 4 Total
Score | Severity | Version | Vector String |
---|---|---|---|
7.1 | HIGH | 4.0 | CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
6.5 | MEDIUM | 3.1 | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
6.5 | MEDIUM | 3.0 | CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
6.1 | — | 2.0 | AV:A/AC:L/Au:N/C:N/I:N/A:C |
Product Status
Learn moreVersions 2 Total
Default Status: unknown
affected
Versions 2 Total
Default Status: unknown
affected
Credits
- zhongwei gu (VulDB User) reporter
References 5 Total
- vuldb.com: VDB-302013 | TRENDnet TEW-637AP/TEW-638APB HTTP Request goahead sub_41DED0 null pointer dereference vdb-entrytechnical-description
- vuldb.com: VDB-302013 | CTI Indicators (IOB, IOC, IOA) signaturepermissions-required
- vuldb.com: Submit #521727 | TRENDnet wi-fi access point TEW_637AP_V2_FW1.3.0.106/FW_TEW_638APB_V2_1.2.7 NULL Pointer Dereference third-party-advisory
- https://docs.google.com/document/d/17FadWn-UWXjvcYNzDI4JRjag-lGUU9pJ/edit#heading=h.gjdgxs related
- https://drive.google.com/file/d/1SS7jsYBNl0faSOy_vH5tNn_xJJ_HA1xU/view?usp=drive_link exploit