Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51187: n/a

0
Medium
VulnerabilityCVE-2024-51187cvecve-2024-51187
Published: Mon Nov 11 2024 (11/11/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-51187 is a stored cross-site scripting (XSS) vulnerability affecting certain TRENDnet router models, specifically TEW-651BR 2. 04B1, TEW-652BRP 3. 04b01, and TEW-652BRU 1. 00b12. The vulnerability exists in the firewallRule_Name_1. 1. 1. 0. 0 parameter on the /firewall_setting. htm page.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:25:14 UTC

Technical Analysis

CVE-2024-51187 identifies a stored cross-site scripting (XSS) vulnerability in specific firmware versions of TRENDnet routers: TEW-651BR 2.04B1, TEW-652BRP 3.04b01, and TEW-652BRU 1.00b12. The flaw resides in the firewallRule_Name_1.1.1.0.0 parameter on the /firewall_setting.htm administrative page. Stored XSS vulnerabilities allow an attacker to inject malicious JavaScript code that is permanently stored on the device and executed when an authenticated user accesses the affected page. This vulnerability requires the attacker to have low privileges (authenticated user) and some user interaction (visiting the page). The CVSS vector indicates the attack is network-based (AV:A), with low attack complexity (AC:L), requiring privileges (PR:L), and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability can affect components beyond the vulnerable component. The impact affects confidentiality and integrity to a limited degree (C:L, I:L), but availability is not impacted (A:N). No patches or known exploits are currently available, and the vulnerability was published recently on November 11, 2024. The CWE classification is CWE-79, which corresponds to cross-site scripting vulnerabilities. This vulnerability could allow attackers to steal session tokens, manipulate router settings, or conduct further attacks within the network if exploited.

Potential Impact

The primary impact of CVE-2024-51187 is on the confidentiality and integrity of the affected TRENDnet routers' administrative interface. An attacker who gains authenticated access can inject malicious scripts that execute in the context of the router's web interface, potentially stealing session cookies, hijacking administrative sessions, or altering firewall rules and other configurations. This could lead to unauthorized network access, data interception, or persistent compromise of the network environment. However, the vulnerability does not directly affect device availability, so denial of service is unlikely. Since exploitation requires authentication and user interaction, the risk is somewhat mitigated but still significant in environments where multiple users have access to router management or where credentials may be compromised. Organizations relying on these TRENDnet models for network perimeter security could face increased risk of lateral movement and data breaches if this vulnerability is exploited.

Mitigation Recommendations

1. Restrict access to the router's administrative interface to trusted personnel only, ideally limiting access to secure management VLANs or via VPN. 2. Enforce strong authentication mechanisms and regularly update credentials to reduce the risk of unauthorized access. 3. Monitor router management interfaces for unusual activity or unexpected changes in firewall rules. 4. Disable or limit the use of the vulnerable firewallRule_Name_1.1.1.0.0 parameter if possible until a patch is available. 5. Regularly check TRENDnet's official channels for firmware updates or security advisories addressing this vulnerability and apply patches promptly once released. 6. Employ network segmentation to limit the impact of a compromised router. 7. Educate administrators about the risks of stored XSS and the importance of cautious interaction with router management pages. 8. Consider deploying web application firewalls or intrusion detection systems that can detect and block XSS payloads targeting router interfaces.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bacb7ef31ef0b55889d

Added to database: 2/25/2026, 9:37:48 PM

Last enriched: 2/26/2026, 1:25:14 AM

Last updated: 2/26/2026, 9:50:46 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats