Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51188: n/a

0
Medium
VulnerabilityCVE-2024-51188cvecve-2024-51188
Published: Mon Nov 11 2024 (11/11/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-51188 is a medium-severity stored cross-site scripting (XSS) vulnerability affecting certain TRENDnet router models, specifically TEW-651BR 2. 04B1, TEW-652BRP 3. 04b01, and TEW-652BRU 1. 00b12. The vulnerability exists in the handling of the vsRule_VirtualServerName_1. 1. 10. 0. 0 parameter on the /virtual_server. htm page.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:25:29 UTC

Technical Analysis

CVE-2024-51188 is a stored cross-site scripting (XSS) vulnerability identified in several TRENDnet router models: TEW-651BR 2.04B1, TEW-652BRP 3.04b01, and TEW-652BRU 1.00b12. The vulnerability arises from improper sanitization of the vsRule_VirtualServerName_1.1.10.0.0 parameter on the /virtual_server.htm administrative page. Stored XSS means that malicious input submitted by an attacker is saved by the device and later executed in the context of the web interface when viewed by an authenticated user. The CVSS 3.1 base score is 4.8 (medium), reflecting that exploitation requires local network access (Attack Vector: Adjacent), low attack complexity, low privileges (authenticated user), and user interaction (UI required). The scope is changed (S:C), indicating that the vulnerability affects components beyond the initially vulnerable part, potentially impacting the entire device management interface. The impact primarily affects confidentiality and integrity, allowing attackers to execute arbitrary scripts that could steal session tokens, manipulate router settings, or perform actions on behalf of the user. Availability is not impacted. No public exploits or patches are currently available, and the vulnerability was reserved on 2024-10-28 and published on 2024-11-11. The CWE classification is CWE-79, which corresponds to improper neutralization of input leading to XSS. This vulnerability highlights the importance of input validation and output encoding in embedded device web interfaces.

Potential Impact

The vulnerability could allow an attacker with authenticated access to inject malicious scripts into the router’s web management interface, which are then executed when an administrator or user accesses the affected page. This can lead to theft of authentication cookies, session hijacking, or unauthorized changes to router configurations, potentially compromising network security. Since the attack requires authentication and user interaction, the risk is somewhat limited to internal or trusted users or attackers who have obtained credentials. However, in environments where multiple users share access or where credentials are weak or leaked, the impact could be significant. Compromise of router settings could lead to network traffic interception, redirection, or denial of service through misconfiguration. Organizations relying on these TRENDnet devices for network perimeter security or internal segmentation could face confidentiality breaches and integrity violations. The absence of known exploits in the wild reduces immediate risk, but the medium severity score warrants proactive mitigation.

Mitigation Recommendations

1. Restrict access to the router’s web management interface to trusted administrators only, ideally via a secure management VLAN or VPN. 2. Enforce strong authentication mechanisms and regularly update credentials to prevent unauthorized access. 3. Monitor for firmware updates or security advisories from TRENDnet and apply patches promptly once available. 4. Disable or limit the use of the virtual server configuration page if not required, reducing the attack surface. 5. Employ network segmentation to isolate management interfaces from general user networks. 6. Use web application firewalls or intrusion detection systems that can detect and block XSS payloads targeting internal devices. 7. Educate administrators about the risks of clicking suspicious links or executing unknown scripts within the router interface. 8. Regularly audit router configurations and logs for unusual activity that may indicate exploitation attempts. These steps go beyond generic advice by focusing on access control, monitoring, and minimizing exposure of the vulnerable interface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bacb7ef31ef0b5588a3

Added to database: 2/25/2026, 9:37:48 PM

Last enriched: 2/26/2026, 1:25:29 AM

Last updated: 2/26/2026, 7:28:44 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats