CVE-2024-51189: n/a
CVE-2024-51189 is a stored Cross-Site Scripting (XSS) vulnerability affecting certain TRENDnet router models, specifically TEW-651BR 2. 04B1, TEW-652BRP 3. 04b01, and TEW-652BRU 1. 00b12. The vulnerability exists in the macList_Name_1. 1. 1. 0. 0 parameter on the /filters. htm page, allowing an authenticated user with low privileges to inject malicious scripts that persist on the device.
AI Analysis
Technical Summary
CVE-2024-51189 identifies a stored Cross-Site Scripting (XSS) vulnerability in specific TRENDnet router models: TEW-651BR 2.04B1, TEW-652BRP 3.04b01, and TEW-652BRU 1.00b12. The vulnerability resides in the macList_Name_1.1.1.0.0 parameter on the /filters.htm page of the router’s web management interface. Stored XSS means that malicious input submitted via this parameter is saved by the device and later rendered in the web interface without proper sanitization or encoding, allowing an attacker to inject and execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation requires the attacker to have low-level privileges (PR:L) and user interaction (UI:R), such as an authenticated user submitting crafted input. The vulnerability has a CVSS 3.1 base score of 4.8, indicating medium severity with limited confidentiality and integrity impacts and no availability impact. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, potentially impacting the entire router management interface session. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local or adjacent network segment. No known exploits are reported in the wild, and no patches have been released at the time of publication. This vulnerability falls under CWE-79, the common weakness enumeration for improper neutralization of input during web page generation, leading to XSS. The vulnerability could allow attackers to hijack sessions, steal credentials, or perform unauthorized actions within the router’s web interface if exploited.
Potential Impact
The primary impact of CVE-2024-51189 is the potential compromise of confidentiality and integrity within the affected TRENDnet router’s web management interface. An attacker exploiting this stored XSS vulnerability could execute arbitrary scripts in the context of an authenticated user’s session, potentially stealing session cookies, credentials, or manipulating router settings. This could lead to unauthorized network configuration changes, redirection of traffic, or persistent compromise of the network perimeter device. Since the attack vector is adjacent network and requires low privileges and user interaction, the risk is somewhat limited to internal or local network attackers or compromised users. However, in environments where these routers are used as gateways or in small office/home office (SOHO) settings, the impact could be significant, enabling lateral movement or persistent footholds. The lack of availability impact reduces the risk of denial-of-service, but the confidentiality and integrity risks remain notable. The absence of known exploits in the wild suggests limited current exploitation but also highlights the need for proactive mitigation before attackers develop weaponized exploits.
Mitigation Recommendations
1. Restrict access to the router’s web management interface to trusted administrators only, preferably via secure management VLANs or VPNs, to reduce exposure to adjacent network attackers. 2. Enforce strong authentication and limit the number of users with access to the router’s web interface to minimize the risk of malicious input submission. 3. Monitor network traffic and router logs for unusual activity or unexpected changes to filter lists or device configurations that could indicate exploitation attempts. 4. Apply input validation and output encoding on the macList_Name_1.1.1.0.0 parameter if possible via firmware updates or configuration changes; since no patches are currently available, contact TRENDnet support for guidance or early firmware releases. 5. Disable or limit the use of the vulnerable /filters.htm page if feasible, or restrict its access. 6. Educate users and administrators about the risks of stored XSS and the importance of not entering untrusted data into router management interfaces. 7. Regularly check for firmware updates from TRENDnet and apply them promptly once a patch addressing this vulnerability is released. 8. Consider network segmentation to isolate vulnerable devices from critical infrastructure to limit potential lateral movement.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, India, Brazil
CVE-2024-51189: n/a
Description
CVE-2024-51189 is a stored Cross-Site Scripting (XSS) vulnerability affecting certain TRENDnet router models, specifically TEW-651BR 2. 04B1, TEW-652BRP 3. 04b01, and TEW-652BRU 1. 00b12. The vulnerability exists in the macList_Name_1. 1. 1. 0. 0 parameter on the /filters. htm page, allowing an authenticated user with low privileges to inject malicious scripts that persist on the device.
AI-Powered Analysis
Technical Analysis
CVE-2024-51189 identifies a stored Cross-Site Scripting (XSS) vulnerability in specific TRENDnet router models: TEW-651BR 2.04B1, TEW-652BRP 3.04b01, and TEW-652BRU 1.00b12. The vulnerability resides in the macList_Name_1.1.1.0.0 parameter on the /filters.htm page of the router’s web management interface. Stored XSS means that malicious input submitted via this parameter is saved by the device and later rendered in the web interface without proper sanitization or encoding, allowing an attacker to inject and execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation requires the attacker to have low-level privileges (PR:L) and user interaction (UI:R), such as an authenticated user submitting crafted input. The vulnerability has a CVSS 3.1 base score of 4.8, indicating medium severity with limited confidentiality and integrity impacts and no availability impact. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, potentially impacting the entire router management interface session. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local or adjacent network segment. No known exploits are reported in the wild, and no patches have been released at the time of publication. This vulnerability falls under CWE-79, the common weakness enumeration for improper neutralization of input during web page generation, leading to XSS. The vulnerability could allow attackers to hijack sessions, steal credentials, or perform unauthorized actions within the router’s web interface if exploited.
Potential Impact
The primary impact of CVE-2024-51189 is the potential compromise of confidentiality and integrity within the affected TRENDnet router’s web management interface. An attacker exploiting this stored XSS vulnerability could execute arbitrary scripts in the context of an authenticated user’s session, potentially stealing session cookies, credentials, or manipulating router settings. This could lead to unauthorized network configuration changes, redirection of traffic, or persistent compromise of the network perimeter device. Since the attack vector is adjacent network and requires low privileges and user interaction, the risk is somewhat limited to internal or local network attackers or compromised users. However, in environments where these routers are used as gateways or in small office/home office (SOHO) settings, the impact could be significant, enabling lateral movement or persistent footholds. The lack of availability impact reduces the risk of denial-of-service, but the confidentiality and integrity risks remain notable. The absence of known exploits in the wild suggests limited current exploitation but also highlights the need for proactive mitigation before attackers develop weaponized exploits.
Mitigation Recommendations
1. Restrict access to the router’s web management interface to trusted administrators only, preferably via secure management VLANs or VPNs, to reduce exposure to adjacent network attackers. 2. Enforce strong authentication and limit the number of users with access to the router’s web interface to minimize the risk of malicious input submission. 3. Monitor network traffic and router logs for unusual activity or unexpected changes to filter lists or device configurations that could indicate exploitation attempts. 4. Apply input validation and output encoding on the macList_Name_1.1.1.0.0 parameter if possible via firmware updates or configuration changes; since no patches are currently available, contact TRENDnet support for guidance or early firmware releases. 5. Disable or limit the use of the vulnerable /filters.htm page if feasible, or restrict its access. 6. Educate users and administrators about the risks of stored XSS and the importance of not entering untrusted data into router management interfaces. 7. Regularly check for firmware updates from TRENDnet and apply them promptly once a patch addressing this vulnerability is released. 8. Consider network segmentation to isolate vulnerable devices from critical infrastructure to limit potential lateral movement.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-10-28T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6bacb7ef31ef0b5588a9
Added to database: 2/25/2026, 9:37:48 PM
Last enriched: 2/26/2026, 1:25:45 AM
Last updated: 2/26/2026, 6:36:26 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.