6.5
CVE-2021-28846
- EPSS 0.31%
- Published 10.08.2021 20:15:08
- Last modified 21.11.2024 06:00:19
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
A Format String vulnerablity exists in TRENDnet TEW-755AP 1.11B03, TEW-755AP2KAC 1.11B03, TEW-821DAP2KAC 1.11B03, and TEW-825DAP 1.11B03, which could let a remote malicious user cause a denial of service due to a logic bug at address 0x40dcd0 when calling fprintf with "%s: key len = %d, too long\n" format. The two variables seem to be put in the wrong order. The vulnerability could be triggered by sending the POST request to apply_cgi with a long and unknown key in the request body.
Data is provided by the National Vulnerability Database (NVD)
Trendnet ≫ Tew-755ap Firmware Version1.11b03
Trendnet ≫ Tew-755ap2kac Firmware Version1.11b03
Trendnet ≫ Tew-821dap2kac Firmware Version1.11b03
Trendnet ≫ Tew-825dap Firmware Version1.11b03
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.31% | 0.509 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 4 | 8 | 2.9 |
AV:N/AC:L/Au:S/C:N/I:N/A:P
|
CWE-134 Use of Externally-Controlled Format String
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.