CVE-2024-51189

4.8 MEDIUM

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts via the macList_Name_1.1.1.0.0 parameter on the /filters.htm page of affected TRENDnet routers. When exploited, it enables cross-site scripting attacks that could steal session cookies or redirect users to malicious sites. Users of TRENDnet TEW-651BR, TEW-652BRP, and TEW-652BRU devices with vulnerable firmware versions are affected.

💻 Affected Systems

Products:
  • TRENDnet TEW-651BR
  • TRENDnet TEW-652BRP
  • TRENDnet TEW-652BRU
Versions: TEW-651BR 2.04B1, TEW-652BRP 3.04b01, TEW-652BRU 1.00b12
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration. Requires attacker to have network access to router admin interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals administrator credentials, takes full control of router, redirects all network traffic to malicious sites, and installs persistent malware on connected devices.

🟠

Likely Case

Attacker steals session cookies to gain unauthorized access to router admin panel, modifies network settings, or redirects users to phishing pages.

🟢

If Mitigated

Limited to stealing session data from users who access the compromised admin interface, with no persistent compromise if proper session management is in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires attacker to trick authenticated user into visiting malicious link or submitting crafted form to /filters.htm page.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check TRENDnet website for firmware updates. 2. Download latest firmware for your model. 3. Log into router admin panel. 4. Navigate to firmware update section. 5. Upload and apply new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Disable Remote Admin Access

all

Prevent external access to router admin interface

Login to router admin → Administration → Remote Management → Disable

Use Strong Admin Credentials

all

Change default admin password to complex, unique password

Login to router admin → Administration → Password → Set strong password

🧯 If You Can't Patch

  • Isolate router on separate VLAN with restricted access
  • Implement web application firewall rules to block XSS payloads to /filters.htm

🔍 How to Verify

Check if Vulnerable:

Access router admin panel, navigate to /filters.htm, inspect macList_Name_1.1.1.0.0 parameter for lack of input sanitization

Check Version:

Login to router admin panel and check firmware version in status/system information

Verify Fix Applied:

Test if script tags in macList_Name_1.1.1.0.0 parameter are properly sanitized or blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /filters.htm with script tags
  • Multiple failed login attempts followed by successful admin access

Network Indicators:

  • HTTP traffic to router IP on admin port with XSS payloads in parameters
  • Unusual outbound connections from router

SIEM Query:

source_ip=router_ip AND (uri_path="/filters.htm" AND (param="macList_Name_1.1.1.0.0" AND value CONTAINS "<script>"))

🔗 References

📤 Share & Export