CVE-2024-51188: n/a
CVE-2024-51188 is a medium-severity stored cross-site scripting (XSS) vulnerability affecting certain TRENDnet router models, specifically TEW-651BR 2. 04B1, TEW-652BRP 3. 04b01, and TEW-652BRU 1. 00b12. The vulnerability exists in the handling of the vsRule_VirtualServerName_1. 1. 10. 0. 0 parameter on the /virtual_server. htm page.
AI Analysis
Technical Summary
CVE-2024-51188 is a stored cross-site scripting (XSS) vulnerability identified in several TRENDnet router models: TEW-651BR 2.04B1, TEW-652BRP 3.04b01, and TEW-652BRU 1.00b12. The vulnerability arises from improper sanitization of the vsRule_VirtualServerName_1.1.10.0.0 parameter on the /virtual_server.htm administrative page. Stored XSS means that malicious input submitted by an attacker is saved by the device and later executed in the context of the web interface when viewed by an authenticated user. The CVSS 3.1 base score is 4.8 (medium), reflecting that exploitation requires local network access (Attack Vector: Adjacent), low attack complexity, low privileges (authenticated user), and user interaction (UI required). The scope is changed (S:C), indicating that the vulnerability affects components beyond the initially vulnerable part, potentially impacting the entire device management interface. The impact primarily affects confidentiality and integrity, allowing attackers to execute arbitrary scripts that could steal session tokens, manipulate router settings, or perform actions on behalf of the user. Availability is not impacted. No public exploits or patches are currently available, and the vulnerability was reserved on 2024-10-28 and published on 2024-11-11. The CWE classification is CWE-79, which corresponds to improper neutralization of input leading to XSS. This vulnerability highlights the importance of input validation and output encoding in embedded device web interfaces.
Potential Impact
The vulnerability could allow an attacker with authenticated access to inject malicious scripts into the router’s web management interface, which are then executed when an administrator or user accesses the affected page. This can lead to theft of authentication cookies, session hijacking, or unauthorized changes to router configurations, potentially compromising network security. Since the attack requires authentication and user interaction, the risk is somewhat limited to internal or trusted users or attackers who have obtained credentials. However, in environments where multiple users share access or where credentials are weak or leaked, the impact could be significant. Compromise of router settings could lead to network traffic interception, redirection, or denial of service through misconfiguration. Organizations relying on these TRENDnet devices for network perimeter security or internal segmentation could face confidentiality breaches and integrity violations. The absence of known exploits in the wild reduces immediate risk, but the medium severity score warrants proactive mitigation.
Mitigation Recommendations
1. Restrict access to the router’s web management interface to trusted administrators only, ideally via a secure management VLAN or VPN. 2. Enforce strong authentication mechanisms and regularly update credentials to prevent unauthorized access. 3. Monitor for firmware updates or security advisories from TRENDnet and apply patches promptly once available. 4. Disable or limit the use of the virtual server configuration page if not required, reducing the attack surface. 5. Employ network segmentation to isolate management interfaces from general user networks. 6. Use web application firewalls or intrusion detection systems that can detect and block XSS payloads targeting internal devices. 7. Educate administrators about the risks of clicking suspicious links or executing unknown scripts within the router interface. 8. Regularly audit router configurations and logs for unusual activity that may indicate exploitation attempts. These steps go beyond generic advice by focusing on access control, monitoring, and minimizing exposure of the vulnerable interface.
Affected Countries
United States, Canada, Germany, United Kingdom, Australia, France, Japan, South Korea, India, Brazil
CVE-2024-51188: n/a
Description
CVE-2024-51188 is a medium-severity stored cross-site scripting (XSS) vulnerability affecting certain TRENDnet router models, specifically TEW-651BR 2. 04B1, TEW-652BRP 3. 04b01, and TEW-652BRU 1. 00b12. The vulnerability exists in the handling of the vsRule_VirtualServerName_1. 1. 10. 0. 0 parameter on the /virtual_server. htm page.
AI-Powered Analysis
Technical Analysis
CVE-2024-51188 is a stored cross-site scripting (XSS) vulnerability identified in several TRENDnet router models: TEW-651BR 2.04B1, TEW-652BRP 3.04b01, and TEW-652BRU 1.00b12. The vulnerability arises from improper sanitization of the vsRule_VirtualServerName_1.1.10.0.0 parameter on the /virtual_server.htm administrative page. Stored XSS means that malicious input submitted by an attacker is saved by the device and later executed in the context of the web interface when viewed by an authenticated user. The CVSS 3.1 base score is 4.8 (medium), reflecting that exploitation requires local network access (Attack Vector: Adjacent), low attack complexity, low privileges (authenticated user), and user interaction (UI required). The scope is changed (S:C), indicating that the vulnerability affects components beyond the initially vulnerable part, potentially impacting the entire device management interface. The impact primarily affects confidentiality and integrity, allowing attackers to execute arbitrary scripts that could steal session tokens, manipulate router settings, or perform actions on behalf of the user. Availability is not impacted. No public exploits or patches are currently available, and the vulnerability was reserved on 2024-10-28 and published on 2024-11-11. The CWE classification is CWE-79, which corresponds to improper neutralization of input leading to XSS. This vulnerability highlights the importance of input validation and output encoding in embedded device web interfaces.
Potential Impact
The vulnerability could allow an attacker with authenticated access to inject malicious scripts into the router’s web management interface, which are then executed when an administrator or user accesses the affected page. This can lead to theft of authentication cookies, session hijacking, or unauthorized changes to router configurations, potentially compromising network security. Since the attack requires authentication and user interaction, the risk is somewhat limited to internal or trusted users or attackers who have obtained credentials. However, in environments where multiple users share access or where credentials are weak or leaked, the impact could be significant. Compromise of router settings could lead to network traffic interception, redirection, or denial of service through misconfiguration. Organizations relying on these TRENDnet devices for network perimeter security or internal segmentation could face confidentiality breaches and integrity violations. The absence of known exploits in the wild reduces immediate risk, but the medium severity score warrants proactive mitigation.
Mitigation Recommendations
1. Restrict access to the router’s web management interface to trusted administrators only, ideally via a secure management VLAN or VPN. 2. Enforce strong authentication mechanisms and regularly update credentials to prevent unauthorized access. 3. Monitor for firmware updates or security advisories from TRENDnet and apply patches promptly once available. 4. Disable or limit the use of the virtual server configuration page if not required, reducing the attack surface. 5. Employ network segmentation to isolate management interfaces from general user networks. 6. Use web application firewalls or intrusion detection systems that can detect and block XSS payloads targeting internal devices. 7. Educate administrators about the risks of clicking suspicious links or executing unknown scripts within the router interface. 8. Regularly audit router configurations and logs for unusual activity that may indicate exploitation attempts. These steps go beyond generic advice by focusing on access control, monitoring, and minimizing exposure of the vulnerable interface.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-10-28T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6bacb7ef31ef0b5588a3
Added to database: 2/25/2026, 9:37:48 PM
Last enriched: 2/26/2026, 1:25:29 AM
Last updated: 2/26/2026, 7:28:44 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.