Buffer overflow vulnerability in Trendnet TEG-40128 Web Smart Switch v1(1.00.023) due to the lack of length verification, which is related to the mobile access point setup operation. The attacker can directly control the remote target device by successfully exploiting this vulnerability.
History

Thu, 13 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 11 Feb 2025 19:15:00 +0000

Type Values Removed Values Added
Description Buffer overflow vulnerability in Trendnet TEG-40128 Web Smart Switch v1(1.00.023) due to the lack of length verification, which is related to the mobile access point setup operation. The attacker can directly control the remote target device by successfully exploiting this vulnerability.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-02-11T00:00:00.000Z

Updated: 2025-02-13T17:38:01.938Z

Reserved: 2025-02-07T00:00:00.000Z

Link: CVE-2025-25523

cve-icon Vulnrichment

Updated: 2025-02-13T17:37:49.420Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-02-11T19:15:19.000

Modified: 2025-02-13T18:18:23.400

Link: CVE-2025-25523

cve-icon Redhat

No data.