Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 18 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Trendnet tew-824dru
|
|
| Vendors & Products |
Trendnet tew-824dru
|
Tue, 17 Mar 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in TRENDnet TEW-824DRU 1.010B01/1.04B01. The impacted element is the function sub_420A78 of the file apply_sec.cgi of the component Web Interface. Such manipulation of the argument Language leads to cross site scripting. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | TRENDnet TEW-824DRU Web apply_sec.cgi sub_420A78 cross site scripting | |
| First Time appeared |
Trendnet
Trendnet tew-824dru Firmware |
|
| Weaknesses | CWE-79 CWE-94 |
|
| CPEs | cpe:2.3:o:trendnet:tew-824dru_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Trendnet
Trendnet tew-824dru Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-18T20:19:29.923Z
Reserved: 2026-03-17T18:23:31.433Z
Link: CVE-2026-4354
Updated: 2026-03-18T20:19:27.283Z
Status : Awaiting Analysis
Published: 2026-03-18T00:16:20.457
Modified: 2026-03-18T14:52:44.227
Link: CVE-2026-4354
No data.
OpenCVE Enrichment
Updated: 2026-03-18T10:42:32Z