Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-36193 | TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action vlan_setting with a sufficiently long dns1 or dns 2 key. |
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 01 Apr 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Trendnet
Trendnet tew-827dru Trendnet tew-827dru Firmware |
|
| CPEs | cpe:2.3:h:trendnet:tew-827dru:-:*:*:*:*:*:*:* cpe:2.3:o:trendnet:tew-827dru_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Trendnet
Trendnet tew-827dru Trendnet tew-827dru Firmware |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T15:59:29.702Z
Reserved: 2024-05-30T00:00:00.000Z
Link: CVE-2024-36728
Updated: 2024-08-02T03:37:05.488Z
Status : Analyzed
Published: 2024-06-03T14:15:09.330
Modified: 2025-04-01T18:21:29.640
Link: CVE-2024-36728
No data.
OpenCVE Enrichment
No data.
EUVD