Back to VulnFeed / CVE-2026-7607
root@hackertop:~/vulnfeed/CVE-2026-7607#
CVE-2026-7607 HIGH Memory Corruption ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

TRENDnet TEW-821DAP 1.12B01 Firmware Udpate auto_update_firmware str buffer overflow

TEW-821DAP 23h ago Impact pending confirmation
LIFECYCLE
8.5 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability was found in TRENDnet TEW-821DAP 1.12B01. It has been classified as critical. Affected is the function auto_update_firmware of the component Firmware Udpate. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Root Cause Analysis
The manipulation of the argument str with an unknown input leads to a unknown weakness. CWE is classifying the issue as CWE-120. The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.

Impact: This is going to have an impact on confidentiality, integrity, and availability.

Exploit: The vendor explains: "That firmware version will only work on our hardware version v1.xR. We have already EOL that product 8 years ago and are no longer selling".

Countermeasure: There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-7607 · CVSS 8.5 · Active Threat