// For flags

CVE-2021-28846

 

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A Format String vulnerablity exists in TRENDnet TEW-755AP 1.11B03, TEW-755AP2KAC 1.11B03, TEW-821DAP2KAC 1.11B03, and TEW-825DAP 1.11B03, which could let a remote malicious user cause a denial of service due to a logic bug at address 0x40dcd0 when calling fprintf with "%s: key len = %d, too long
" format. The two variables seem to be put in the wrong order. The vulnerability could be triggered by sending the POST request to apply_cgi with a long and unknown key in the request body.

Se presenta una vulnerabilidad de cadena de formato en TRENDnet TEW-755AP versión 1.11B03, TEW-755AP2KAC versión 1.11B03, TEW-821DAP2KAC versión 1.11B03, y TEW-825DAP versión 1.11B03, que podría permitir a un usuario remoto malicioso causar una denegación de servicio debido a un error lógico en la dirección 0x40dcd0 cuando se llama a fprintf con el formato "%s: key len = %d, too long
". Las dos variables parecen estar puestas en el orden incorrecto. La vulnerabilidad podría activarse mediante el envío de una petición POST a la función apply_cgi con una clave larga y desconocida en el cuerpo de la petición

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-03-19 CVE Reserved
  • 2021-08-10 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-134: Use of Externally-Controlled Format String
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Trendnet
Search vendor "Trendnet"
Tew-755ap Firmware
Search vendor "Trendnet" for product "Tew-755ap Firmware"
1.11b03
Search vendor "Trendnet" for product "Tew-755ap Firmware" and version "1.11b03"
-
Affected
in Trendnet
Search vendor "Trendnet"
Tew-755ap
Search vendor "Trendnet" for product "Tew-755ap"
--
Safe
Trendnet
Search vendor "Trendnet"
Tew-755ap2kac Firmware
Search vendor "Trendnet" for product "Tew-755ap2kac Firmware"
1.11b03
Search vendor "Trendnet" for product "Tew-755ap2kac Firmware" and version "1.11b03"
-
Affected
in Trendnet
Search vendor "Trendnet"
Tew-755ap2kac
Search vendor "Trendnet" for product "Tew-755ap2kac"
--
Safe
Trendnet
Search vendor "Trendnet"
Tew-821dap2kac Firmware
Search vendor "Trendnet" for product "Tew-821dap2kac Firmware"
1.11b03
Search vendor "Trendnet" for product "Tew-821dap2kac Firmware" and version "1.11b03"
-
Affected
in Trendnet
Search vendor "Trendnet"
Tew-821dap2kac
Search vendor "Trendnet" for product "Tew-821dap2kac"
--
Safe
Trendnet
Search vendor "Trendnet"
Tew-825dap Firmware
Search vendor "Trendnet" for product "Tew-825dap Firmware"
1.11b03
Search vendor "Trendnet" for product "Tew-825dap Firmware" and version "1.11b03"
-
Affected
in Trendnet
Search vendor "Trendnet"
Tew-825dap
Search vendor "Trendnet" for product "Tew-825dap"
--
Safe