The TRENDnet TI-PG1284i switch(hw v2.0R) prior to version 2.0.2.S0 suffers from an integer underflow vulnerability. This vulnerability exists in its lldp related component. Due to lack of proper validation on length field of PortID TLV, by sending a crafted lldp packet to the device, integer underflow would occur and the negative number will be passed to memcpy() later, which may cause buffer overflow or invalid memory access.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Trendnet
Subscribe
|
Teg-30102ws
Subscribe
Teg-30102ws Firmware
Subscribe
Ti-g102i
Subscribe
Ti-g102i Firmware
Subscribe
Ti-g160i
Subscribe
Ti-g160i Firmware
Subscribe
Ti-g642i
Subscribe
Ti-g642i Firmware
Subscribe
Ti-pg102i
Subscribe
Ti-pg102i Firmware
Subscribe
Ti-pg1284i
Subscribe
Ti-pg1284i Firmware
Subscribe
Ti-pg541i
Subscribe
Ti-pg541i Firmware
Subscribe
Ti-rp262i
Subscribe
Ti-rp262i Firmware
Subscribe
Tpe-30102ws
Subscribe
Tpe-30102ws Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-20025 | The TRENDnet TI-PG1284i switch(hw v2.0R) prior to version 2.0.2.S0 suffers from an integer underflow vulnerability. This vulnerability exists in its lldp related component. Due to lack of proper validation on length field of PortID TLV, by sending a crafted lldp packet to the device, integer underflow would occur and the negative number will be passed to memcpy() later, which may cause buffer overflow or invalid memory access. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.trendnet.com/support/view.asp?cat=4&id=81 |
|
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T23:50:41.420Z
Reserved: 2021-05-20T00:00:00
Link: CVE-2021-33315
No data.
Status : Modified
Published: 2022-05-11T18:15:22.580
Modified: 2024-11-21T06:08:40.260
Link: CVE-2021-33315
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD