TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action wizard_ipv6 with a sufficiently long reboot_type key.
                
            Metrics
Affected Vendors & Products
References
        History
                    Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        epss
         
  | 
    
        
        
        epss
         
  | 
Tue, 01 Apr 2025 18:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Trendnet tew-827dru
         | 
|
| CPEs | cpe:2.3:h:trendnet:tew-827dru:-:*:*:*:*:*:*:* | |
| Vendors & Products | 
        
        Trendnet tew-827dru
         | 
Wed, 19 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Trendnet
         Trendnet tew-827dru Firmware  | 
|
| CPEs | cpe:2.3:o:trendnet:tew-827dru_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products | 
        
        Trendnet
         Trendnet tew-827dru Firmware  | 
|
| Metrics | 
        
        cvssV3_1
         
 
  | 
Status: PUBLISHED
Assigner: mitre
Published: 2024-06-03T13:57:31.550Z
Updated: 2025-03-19T15:45:44.553Z
Reserved: 2024-05-30T00:00:00.000Z
Link: CVE-2024-36729
Updated: 2024-08-02T03:37:05.341Z
Status : Analyzed
Published: 2024-06-03T14:15:09.433
Modified: 2025-04-01T18:21:25.383
Link: CVE-2024-36729
No data.