Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-50667: n/a

0
Critical
VulnerabilityCVE-2024-50667cvecve-2024-50667
Published: Mon Nov 11 2024 (11/11/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-50667 is a critical stack overflow vulnerability in the boa httpd server of the Trendnet TEW-820AP device firmware version 1. 01. B01. The flaw exists in the handling of IPv6 address input on specific endpoints (/boafrm/formIPv6Addr, /boafrm/formIpv6Setup, /boafrm/formDnsv6) due to insufficient validation. This allows remote attackers to craft malicious payloads that trigger a stack overflow, potentially leading to arbitrary code execution without authentication or user interaction. The vulnerability has a CVSS score of 9. 8, indicating a high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and critical severity make it a significant risk. Organizations using this device should prioritize patching or mitigating this vulnerability to prevent potential compromise.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:04:28 UTC

Technical Analysis

CVE-2024-50667 identifies a critical stack-based buffer overflow vulnerability in the boa httpd server component embedded within the Trendnet TEW-820AP wireless access point firmware version 1.01.B01. The vulnerability arises from inadequate validation of IPv6 address inputs submitted to three specific HTTP endpoints: /boafrm/formIPv6Addr, /boafrm/formIpv6Setup, and /boafrm/formDnsv6. These endpoints are responsible for configuring IPv6-related network settings. Due to improper bounds checking or input sanitization, an attacker can supply specially crafted IPv6 address payloads that overflow the stack buffer. This overflow can overwrite the return address or other control data on the stack, enabling remote code execution under the privileges of the boa httpd process. The vulnerability requires no authentication and no user interaction, making it remotely exploitable over the network. The CVSS v3.1 base score of 9.8 reflects the vulnerability's critical impact on confidentiality, integrity, and availability, as exploitation could allow full device compromise, data theft, or denial of service. Although no public exploits have been reported yet, the vulnerability is classified under CWE-120 (Classic Buffer Overflow), a well-known and frequently exploited weakness. The lack of available patches at the time of disclosure increases the urgency for affected organizations to implement interim mitigations or isolate vulnerable devices until updates are released.

Potential Impact

The exploitation of CVE-2024-50667 can have severe consequences for organizations deploying the Trendnet TEW-820AP access points. Successful attacks can lead to complete compromise of the affected device, allowing attackers to execute arbitrary code remotely. This could result in unauthorized access to internal networks, interception or manipulation of network traffic, and disruption of wireless connectivity. Confidential information passing through the device may be exposed or altered, impacting data confidentiality and integrity. Additionally, attackers could leverage compromised devices as footholds for lateral movement within corporate networks or as launch points for further attacks. The availability of network services could also be disrupted, causing operational downtime. Given that no authentication is required and the vulnerability is remotely exploitable, the risk of widespread attacks is significant, especially in environments where these devices are internet-facing or poorly segmented.

Mitigation Recommendations

1. Immediate mitigation should focus on network-level controls: restrict access to the management interface of the Trendnet TEW-820AP devices to trusted IP addresses only, preferably via VPN or internal networks. 2. Disable IPv6 functionality on the device if not required, as the vulnerability is related to IPv6 address processing. 3. Monitor network traffic for unusual or malformed IPv6 packets targeting the vulnerable endpoints to detect potential exploitation attempts. 4. Implement strict firewall rules to block unsolicited inbound traffic to the device's HTTP management ports from untrusted sources. 5. Regularly check Trendnet's official channels for firmware updates or patches addressing this vulnerability and apply them promptly once available. 6. Consider replacing or segmenting vulnerable devices in critical network zones until a patch is deployed. 7. Conduct internal audits to inventory all affected devices and assess exposure levels. 8. Employ intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts of this specific stack overflow.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b9cb7ef31ef0b55738e

Added to database: 2/25/2026, 9:37:32 PM

Last enriched: 2/26/2026, 1:04:28 AM

Last updated: 2/26/2026, 6:08:52 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats