CVE-2025-25523

Buffer overflow vulnerability in Trendnet TEG-40128 Web Smart Switch v1(1.00.023) due to the lack of length verification, which is related to the mobile access point setup operation. The attacker can directly control the remote target device by successfully exploiting this vulnerability.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:trendnet:teg-40128_firmware:1.00.023:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:teg-40128:-:*:*:*:*:*:*:*

History

23 May 2025, 17:56

Type Values Removed Values Added
First Time Trendnet teg-40128
Trendnet
Trendnet teg-40128 Firmware
References () https://gist.github.com/XiaoCurry/cb190038c9402c9f89681a0e116996f6 - () https://gist.github.com/XiaoCurry/cb190038c9402c9f89681a0e116996f6 - Broken Link
CPE cpe:2.3:h:trendnet:teg-40128:-:*:*:*:*:*:*:*
cpe:2.3:o:trendnet:teg-40128_firmware:1.00.023:*:*:*:*:*:*:*

13 Feb 2025, 18:18

Type Values Removed Values Added
CWE CWE-120
Summary
  • (es) Vulnerabilidad de desbordamiento de búfer en Trendnet TEG-40128 Web Smart Switch v1(1.00.023) debido a la falta de verificación de longitud, que está relacionada con la operación de configuración del punto de acceso móvil. El atacante puede controlar directamente el dispositivo de destino remoto explotando con éxito esta vulnerabilidad.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.9

11 Feb 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-11 19:15

Updated : 2025-05-23 17:56


NVD link : CVE-2025-25523

Mitre link : CVE-2025-25523

CVE.ORG link : CVE-2025-25523


JSON object : View

Products Affected

trendnet

  • teg-40128
  • teg-40128_firmware
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')