CVE-2021-33317
📋 TL;DR
This vulnerability allows remote attackers to crash the LLDP process on TRENDnet TI-PG1284i switches by sending specially crafted LLDP packets that trigger a null pointer dereference. Affected organizations are those using TRENDnet TI-PG1284i hardware version 2.0R switches with firmware older than version 2.0.2.S0.
💻 Affected Systems
- TRENDnet TI-PG1284i switch
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Denial of service affecting network switch management functionality, potentially disrupting LLDP-based network discovery and topology mapping.
Likely Case
Service disruption of the LLDP process causing temporary loss of neighbor discovery capabilities until process restart.
If Mitigated
Minimal impact if switches are patched or network segmentation prevents unauthorized LLDP packet injection.
🎯 Exploit Status
Exploitation requires sending crafted LLDP packets to vulnerable switch interfaces; no authentication required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.0.2.S0
Vendor Advisory: https://www.trendnet.com/support/view.asp?cat=4&id=81
Restart Required: Yes
Instructions:
1. Download firmware version 2.0.2.S0 from TRENDnet support site. 2. Log into switch web interface. 3. Navigate to System > Firmware Upgrade. 4. Upload and apply the new firmware. 5. Reboot the switch.
🔧 Temporary Workarounds
Disable LLDP
allTemporarily disable LLDP protocol on vulnerable switches to prevent exploitation.
configure terminal
no lldp run
end
write memory
Network Segmentation
allRestrict LLDP traffic to trusted network segments using VLANs or ACLs.
🧯 If You Can't Patch
- Implement network segmentation to isolate switches from untrusted networks
- Deploy network monitoring to detect anomalous LLDP traffic patterns
🔍 How to Verify
Check if Vulnerable:
Check firmware version via web interface: System > Firmware Information, or CLI: show version
Check Version:
show version
Verify Fix Applied:
Confirm firmware version is 2.0.2.S0 or later and test LLDP functionality remains operational.
📡 Detection & Monitoring
Log Indicators:
- LLDP process crashes
- Unexpected process restarts
- System log entries indicating null pointer exceptions
Network Indicators:
- Malformed LLDP packets with missing ChassisID TLV
- Unusual LLDP traffic patterns
SIEM Query:
source="switch_logs" AND ("lldp" OR "process crash" OR "null pointer")