CVE-2024-51188: n/a
TRENDnet TEW-651BR 2.04B1, TEW-652BRP 3.04b01, and TEW-652BRU 1.00b12 devices contain a Store Cross-site scripting (XSS) vulnerability via the vsRule_VirtualServerName_1.1.10.0.0 parameter on the /virtual_server.htm page.
AI Analysis
Technical Summary
CVE-2024-51188 is a stored cross-site scripting (XSS) vulnerability identified in several TRENDnet router models: TEW-651BR 2.04B1, TEW-652BRP 3.04b01, and TEW-652BRU 1.00b12. The vulnerability arises from improper sanitization of the vsRule_VirtualServerName_1.1.10.0.0 parameter on the /virtual_server.htm administrative page. Stored XSS means that malicious input submitted by an attacker is saved by the device and later executed in the context of the web interface when viewed by an authenticated user. The CVSS 3.1 base score is 4.8 (medium), reflecting that exploitation requires local network access (Attack Vector: Adjacent), low attack complexity, low privileges (authenticated user), and user interaction (UI required). The scope is changed (S:C), indicating that the vulnerability affects components beyond the initially vulnerable part, potentially impacting the entire device management interface. The impact primarily affects confidentiality and integrity, allowing attackers to execute arbitrary scripts that could steal session tokens, manipulate router settings, or perform actions on behalf of the user. Availability is not impacted. No public exploits or patches are currently available, and the vulnerability was reserved on 2024-10-28 and published on 2024-11-11. The CWE classification is CWE-79, which corresponds to improper neutralization of input leading to XSS. This vulnerability highlights the importance of input validation and output encoding in embedded device web interfaces.
Potential Impact
The vulnerability could allow an attacker with authenticated access to inject malicious scripts into the router’s web management interface, which are then executed when an administrator or user accesses the affected page. This can lead to theft of authentication cookies, session hijacking, or unauthorized changes to router configurations, potentially compromising network security. Since the attack requires authentication and user interaction, the risk is somewhat limited to internal or trusted users or attackers who have obtained credentials. However, in environments where multiple users share access or where credentials are weak or leaked, the impact could be significant. Compromise of router settings could lead to network traffic interception, redirection, or denial of service through misconfiguration. Organizations relying on these TRENDnet devices for network perimeter security or internal segmentation could face confidentiality breaches and integrity violations. The absence of known exploits in the wild reduces immediate risk, but the medium severity score warrants proactive mitigation.
Mitigation Recommendations
1. Restrict access to the router’s web management interface to trusted administrators only, ideally via a secure management VLAN or VPN. 2. Enforce strong authentication mechanisms and regularly update credentials to prevent unauthorized access. 3. Monitor for firmware updates or security advisories from TRENDnet and apply patches promptly once available. 4. Disable or limit the use of the virtual server configuration page if not required, reducing the attack surface. 5. Employ network segmentation to isolate management interfaces from general user networks. 6. Use web application firewalls or intrusion detection systems that can detect and block XSS payloads targeting internal devices. 7. Educate administrators about the risks of clicking suspicious links or executing unknown scripts within the router interface. 8. Regularly audit router configurations and logs for unusual activity that may indicate exploitation attempts. These steps go beyond generic advice by focusing on access control, monitoring, and minimizing exposure of the vulnerable interface.
Affected Countries
United States, Canada, Germany, United Kingdom, Australia, France, Japan, South Korea, India, Brazil
CVE-2024-51188: n/a
Description
TRENDnet TEW-651BR 2.04B1, TEW-652BRP 3.04b01, and TEW-652BRU 1.00b12 devices contain a Store Cross-site scripting (XSS) vulnerability via the vsRule_VirtualServerName_1.1.10.0.0 parameter on the /virtual_server.htm page.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-51188 is a stored cross-site scripting (XSS) vulnerability identified in several TRENDnet router models: TEW-651BR 2.04B1, TEW-652BRP 3.04b01, and TEW-652BRU 1.00b12. The vulnerability arises from improper sanitization of the vsRule_VirtualServerName_1.1.10.0.0 parameter on the /virtual_server.htm administrative page. Stored XSS means that malicious input submitted by an attacker is saved by the device and later executed in the context of the web interface when viewed by an authenticated user. The CVSS 3.1 base score is 4.8 (medium), reflecting that exploitation requires local network access (Attack Vector: Adjacent), low attack complexity, low privileges (authenticated user), and user interaction (UI required). The scope is changed (S:C), indicating that the vulnerability affects components beyond the initially vulnerable part, potentially impacting the entire device management interface. The impact primarily affects confidentiality and integrity, allowing attackers to execute arbitrary scripts that could steal session tokens, manipulate router settings, or perform actions on behalf of the user. Availability is not impacted. No public exploits or patches are currently available, and the vulnerability was reserved on 2024-10-28 and published on 2024-11-11. The CWE classification is CWE-79, which corresponds to improper neutralization of input leading to XSS. This vulnerability highlights the importance of input validation and output encoding in embedded device web interfaces.
Potential Impact
The vulnerability could allow an attacker with authenticated access to inject malicious scripts into the router’s web management interface, which are then executed when an administrator or user accesses the affected page. This can lead to theft of authentication cookies, session hijacking, or unauthorized changes to router configurations, potentially compromising network security. Since the attack requires authentication and user interaction, the risk is somewhat limited to internal or trusted users or attackers who have obtained credentials. However, in environments where multiple users share access or where credentials are weak or leaked, the impact could be significant. Compromise of router settings could lead to network traffic interception, redirection, or denial of service through misconfiguration. Organizations relying on these TRENDnet devices for network perimeter security or internal segmentation could face confidentiality breaches and integrity violations. The absence of known exploits in the wild reduces immediate risk, but the medium severity score warrants proactive mitigation.
Mitigation Recommendations
1. Restrict access to the router’s web management interface to trusted administrators only, ideally via a secure management VLAN or VPN. 2. Enforce strong authentication mechanisms and regularly update credentials to prevent unauthorized access. 3. Monitor for firmware updates or security advisories from TRENDnet and apply patches promptly once available. 4. Disable or limit the use of the virtual server configuration page if not required, reducing the attack surface. 5. Employ network segmentation to isolate management interfaces from general user networks. 6. Use web application firewalls or intrusion detection systems that can detect and block XSS payloads targeting internal devices. 7. Educate administrators about the risks of clicking suspicious links or executing unknown scripts within the router interface. 8. Regularly audit router configurations and logs for unusual activity that may indicate exploitation attempts. These steps go beyond generic advice by focusing on access control, monitoring, and minimizing exposure of the vulnerable interface.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-10-28T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6bacb7ef31ef0b5588a3
Added to database: 2/25/2026, 9:37:48 PM
Last enriched: 2/26/2026, 1:25:29 AM
Last updated: 4/12/2026, 6:13:59 PM
Views: 24
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.