Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51189: n/a

0
Medium
VulnerabilityCVE-2024-51189cvecve-2024-51189
Published: Mon Nov 11 2024 (11/11/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-51189 is a stored Cross-Site Scripting (XSS) vulnerability affecting certain TRENDnet router models, specifically TEW-651BR 2. 04B1, TEW-652BRP 3. 04b01, and TEW-652BRU 1. 00b12. The vulnerability exists in the macList_Name_1. 1. 1. 0. 0 parameter on the /filters. htm page, allowing an authenticated user with low privileges to inject malicious scripts that persist on the device.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:25:45 UTC

Technical Analysis

CVE-2024-51189 identifies a stored Cross-Site Scripting (XSS) vulnerability in specific TRENDnet router models: TEW-651BR 2.04B1, TEW-652BRP 3.04b01, and TEW-652BRU 1.00b12. The vulnerability resides in the macList_Name_1.1.1.0.0 parameter on the /filters.htm page of the router’s web management interface. Stored XSS means that malicious input submitted via this parameter is saved by the device and later rendered in the web interface without proper sanitization or encoding, allowing an attacker to inject and execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation requires the attacker to have low-level privileges (PR:L) and user interaction (UI:R), such as an authenticated user submitting crafted input. The vulnerability has a CVSS 3.1 base score of 4.8, indicating medium severity with limited confidentiality and integrity impacts and no availability impact. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, potentially impacting the entire router management interface session. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local or adjacent network segment. No known exploits are reported in the wild, and no patches have been released at the time of publication. This vulnerability falls under CWE-79, the common weakness enumeration for improper neutralization of input during web page generation, leading to XSS. The vulnerability could allow attackers to hijack sessions, steal credentials, or perform unauthorized actions within the router’s web interface if exploited.

Potential Impact

The primary impact of CVE-2024-51189 is the potential compromise of confidentiality and integrity within the affected TRENDnet router’s web management interface. An attacker exploiting this stored XSS vulnerability could execute arbitrary scripts in the context of an authenticated user’s session, potentially stealing session cookies, credentials, or manipulating router settings. This could lead to unauthorized network configuration changes, redirection of traffic, or persistent compromise of the network perimeter device. Since the attack vector is adjacent network and requires low privileges and user interaction, the risk is somewhat limited to internal or local network attackers or compromised users. However, in environments where these routers are used as gateways or in small office/home office (SOHO) settings, the impact could be significant, enabling lateral movement or persistent footholds. The lack of availability impact reduces the risk of denial-of-service, but the confidentiality and integrity risks remain notable. The absence of known exploits in the wild suggests limited current exploitation but also highlights the need for proactive mitigation before attackers develop weaponized exploits.

Mitigation Recommendations

1. Restrict access to the router’s web management interface to trusted administrators only, preferably via secure management VLANs or VPNs, to reduce exposure to adjacent network attackers. 2. Enforce strong authentication and limit the number of users with access to the router’s web interface to minimize the risk of malicious input submission. 3. Monitor network traffic and router logs for unusual activity or unexpected changes to filter lists or device configurations that could indicate exploitation attempts. 4. Apply input validation and output encoding on the macList_Name_1.1.1.0.0 parameter if possible via firmware updates or configuration changes; since no patches are currently available, contact TRENDnet support for guidance or early firmware releases. 5. Disable or limit the use of the vulnerable /filters.htm page if feasible, or restrict its access. 6. Educate users and administrators about the risks of stored XSS and the importance of not entering untrusted data into router management interfaces. 7. Regularly check for firmware updates from TRENDnet and apply them promptly once a patch addressing this vulnerability is released. 8. Consider network segmentation to isolate vulnerable devices from critical infrastructure to limit potential lateral movement.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bacb7ef31ef0b5588a9

Added to database: 2/25/2026, 9:37:48 PM

Last enriched: 2/26/2026, 1:25:45 AM

Last updated: 2/26/2026, 6:36:26 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats