CVE-2021-28842
📋 TL;DR
A null pointer dereference vulnerability in TRENDnet wireless access points allows remote attackers to cause denial of service by sending a specially crafted POST request without proper authentication. This affects multiple TRENDnet access point models running firmware version 1.11B03. Attackers can crash the device without authentication.
💻 Affected Systems
- TRENDnet TEW-755AP
- TRENDnet TEW-755AP2KAC
- TRENDnet TEW-821DAP2KAC
- TRENDnet TEW-825DAP
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device crash requiring physical reboot, disrupting all wireless connectivity for connected users
Likely Case
Temporary denial of service affecting wireless network availability until device reboots
If Mitigated
No impact if device is patched or network segmentation prevents access to management interface
🎯 Exploit Status
Exploit requires sending a single malformed HTTP POST request to apply_cgi endpoint
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: No official vendor advisory found
Restart Required: No
Instructions:
Check TRENDnet website for firmware updates. If available, download latest firmware and apply through web interface.
🔧 Temporary Workarounds
Network Segmentation
allIsolate access point management interfaces from untrusted networks
Access Control Lists
allRestrict access to management interface IP addresses
🧯 If You Can't Patch
- Replace affected devices with updated models or different vendors
- Implement network monitoring for exploit attempts and prepare incident response
🔍 How to Verify
Check if Vulnerable:
Check firmware version in web interface. If version is 1.11B03 on affected models, device is vulnerable.
Check Version:
Check web interface at http://[device-ip]/ or use SNMP if configured
Verify Fix Applied:
Verify firmware version is updated beyond 1.11B03
📡 Detection & Monitoring
Log Indicators:
- HTTP POST requests to /apply_cgi with action=do_graph_auth missing login_name parameter
- Device reboot logs without normal shutdown
Network Indicators:
- HTTP traffic to device management interface with malformed POST requests
- Sudden loss of connectivity to access point
SIEM Query:
http.method:POST AND http.uri:"/apply_cgi" AND http.param.action:"do_graph_auth" AND NOT http.param.login_name:*