CVE-2024-51187: n/a
CVE-2024-51187 is a stored cross-site scripting (XSS) vulnerability affecting certain TRENDnet router models, specifically TEW-651BR 2. 04B1, TEW-652BRP 3. 04b01, and TEW-652BRU 1. 00b12. The vulnerability exists in the firewallRule_Name_1. 1. 1. 0. 0 parameter on the /firewall_setting. htm page.
AI Analysis
Technical Summary
CVE-2024-51187 identifies a stored cross-site scripting (XSS) vulnerability in specific firmware versions of TRENDnet routers: TEW-651BR 2.04B1, TEW-652BRP 3.04b01, and TEW-652BRU 1.00b12. The flaw resides in the firewallRule_Name_1.1.1.0.0 parameter on the /firewall_setting.htm administrative page. Stored XSS vulnerabilities allow an attacker to inject malicious JavaScript code that is permanently stored on the device and executed when an authenticated user accesses the affected page. This vulnerability requires the attacker to have low privileges (authenticated user) and some user interaction (visiting the page). The CVSS vector indicates the attack is network-based (AV:A), with low attack complexity (AC:L), requiring privileges (PR:L), and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability can affect components beyond the vulnerable component. The impact affects confidentiality and integrity to a limited degree (C:L, I:L), but availability is not impacted (A:N). No patches or known exploits are currently available, and the vulnerability was published recently on November 11, 2024. The CWE classification is CWE-79, which corresponds to cross-site scripting vulnerabilities. This vulnerability could allow attackers to steal session tokens, manipulate router settings, or conduct further attacks within the network if exploited.
Potential Impact
The primary impact of CVE-2024-51187 is on the confidentiality and integrity of the affected TRENDnet routers' administrative interface. An attacker who gains authenticated access can inject malicious scripts that execute in the context of the router's web interface, potentially stealing session cookies, hijacking administrative sessions, or altering firewall rules and other configurations. This could lead to unauthorized network access, data interception, or persistent compromise of the network environment. However, the vulnerability does not directly affect device availability, so denial of service is unlikely. Since exploitation requires authentication and user interaction, the risk is somewhat mitigated but still significant in environments where multiple users have access to router management or where credentials may be compromised. Organizations relying on these TRENDnet models for network perimeter security could face increased risk of lateral movement and data breaches if this vulnerability is exploited.
Mitigation Recommendations
1. Restrict access to the router's administrative interface to trusted personnel only, ideally limiting access to secure management VLANs or via VPN. 2. Enforce strong authentication mechanisms and regularly update credentials to reduce the risk of unauthorized access. 3. Monitor router management interfaces for unusual activity or unexpected changes in firewall rules. 4. Disable or limit the use of the vulnerable firewallRule_Name_1.1.1.0.0 parameter if possible until a patch is available. 5. Regularly check TRENDnet's official channels for firmware updates or security advisories addressing this vulnerability and apply patches promptly once released. 6. Employ network segmentation to limit the impact of a compromised router. 7. Educate administrators about the risks of stored XSS and the importance of cautious interaction with router management pages. 8. Consider deploying web application firewalls or intrusion detection systems that can detect and block XSS payloads targeting router interfaces.
Affected Countries
United States, Canada, Germany, United Kingdom, Australia, Japan, South Korea, India, Brazil, France
CVE-2024-51187: n/a
Description
CVE-2024-51187 is a stored cross-site scripting (XSS) vulnerability affecting certain TRENDnet router models, specifically TEW-651BR 2. 04B1, TEW-652BRP 3. 04b01, and TEW-652BRU 1. 00b12. The vulnerability exists in the firewallRule_Name_1. 1. 1. 0. 0 parameter on the /firewall_setting. htm page.
AI-Powered Analysis
Technical Analysis
CVE-2024-51187 identifies a stored cross-site scripting (XSS) vulnerability in specific firmware versions of TRENDnet routers: TEW-651BR 2.04B1, TEW-652BRP 3.04b01, and TEW-652BRU 1.00b12. The flaw resides in the firewallRule_Name_1.1.1.0.0 parameter on the /firewall_setting.htm administrative page. Stored XSS vulnerabilities allow an attacker to inject malicious JavaScript code that is permanently stored on the device and executed when an authenticated user accesses the affected page. This vulnerability requires the attacker to have low privileges (authenticated user) and some user interaction (visiting the page). The CVSS vector indicates the attack is network-based (AV:A), with low attack complexity (AC:L), requiring privileges (PR:L), and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability can affect components beyond the vulnerable component. The impact affects confidentiality and integrity to a limited degree (C:L, I:L), but availability is not impacted (A:N). No patches or known exploits are currently available, and the vulnerability was published recently on November 11, 2024. The CWE classification is CWE-79, which corresponds to cross-site scripting vulnerabilities. This vulnerability could allow attackers to steal session tokens, manipulate router settings, or conduct further attacks within the network if exploited.
Potential Impact
The primary impact of CVE-2024-51187 is on the confidentiality and integrity of the affected TRENDnet routers' administrative interface. An attacker who gains authenticated access can inject malicious scripts that execute in the context of the router's web interface, potentially stealing session cookies, hijacking administrative sessions, or altering firewall rules and other configurations. This could lead to unauthorized network access, data interception, or persistent compromise of the network environment. However, the vulnerability does not directly affect device availability, so denial of service is unlikely. Since exploitation requires authentication and user interaction, the risk is somewhat mitigated but still significant in environments where multiple users have access to router management or where credentials may be compromised. Organizations relying on these TRENDnet models for network perimeter security could face increased risk of lateral movement and data breaches if this vulnerability is exploited.
Mitigation Recommendations
1. Restrict access to the router's administrative interface to trusted personnel only, ideally limiting access to secure management VLANs or via VPN. 2. Enforce strong authentication mechanisms and regularly update credentials to reduce the risk of unauthorized access. 3. Monitor router management interfaces for unusual activity or unexpected changes in firewall rules. 4. Disable or limit the use of the vulnerable firewallRule_Name_1.1.1.0.0 parameter if possible until a patch is available. 5. Regularly check TRENDnet's official channels for firmware updates or security advisories addressing this vulnerability and apply patches promptly once released. 6. Employ network segmentation to limit the impact of a compromised router. 7. Educate administrators about the risks of stored XSS and the importance of cautious interaction with router management pages. 8. Consider deploying web application firewalls or intrusion detection systems that can detect and block XSS payloads targeting router interfaces.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-10-28T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6bacb7ef31ef0b55889d
Added to database: 2/25/2026, 9:37:48 PM
Last enriched: 2/26/2026, 1:25:14 AM
Last updated: 2/26/2026, 9:50:46 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.