A Format String vulnerablity exists in TRENDnet TEW-755AP 1.11B03, TEW-755AP2KAC 1.11B03, TEW-821DAP2KAC 1.11B03, and TEW-825DAP 1.11B03, which could let a remote malicious user cause a denial of service due to a logic bug at address 0x40dcd0 when calling fprintf with "%s: key len = %d, too long\n" format. The two variables seem to be put in the wrong order. The vulnerability could be triggered by sending the POST request to apply_cgi with a long and unknown key in the request body.
References
Link | Resource |
---|---|
https://github.com/zyw-200/EQUAFL/blob/main/TRENDnet%20ticket.pdf | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-08-10T19:22:31
Updated: 2021-08-10T19:22:31
Reserved: 2021-03-19T00:00:00
Link: CVE-2021-28846
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-08-10T20:15:08.417
Modified: 2021-08-19T17:12:10.670
Link: CVE-2021-28846
JSON object: View
Redhat Information
No data.
CWE