ID

VAR-202501-3954


CVE

CVE-2024-57590


TITLE

TRENDnet  of  TEW-632BRP  Command injection vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-006033

DESCRIPTION

TRENDnet TEW-632BRP v1.010B31 devices have an OS command injection vulnerability in the CGl interface "ntp_sync.cgi",which allows remote attackers to execute arbitrary commands via parameter "ntp_server" passed to the "ntp_sync.cgi" binary through a POST request. TRENDnet of TEW-632BRP Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.62

sources: NVD: CVE-2024-57590 // JVNDB: JVNDB-2025-006033

AFFECTED PRODUCTS

vendor:trendnetmodel:tew-632brpscope:eqversion:1.010b31

Trust: 1.0

vendor:trendnetmodel:tew-632brpscope:eqversion:tew-632brp firmware 1.010b31

Trust: 0.8

vendor:trendnetmodel:tew-632brpscope:eqversion: -

Trust: 0.8

vendor:trendnetmodel:tew-632brpscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2025-006033 // NVD: CVE-2024-57590

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-57590
value: CRITICAL

Trust: 1.0

OTHER: JVNDB-2025-006033
value: CRITICAL

Trust: 0.8

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-57590
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-006033
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2025-006033 // NVD: CVE-2024-57590

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-006033 // NVD: CVE-2024-57590

EXTERNAL IDS

db:NVDid:CVE-2024-57590

Trust: 2.6

db:JVNDBid:JVNDB-2025-006033

Trust: 0.8

sources: JVNDB: JVNDB-2025-006033 // NVD: CVE-2024-57590

REFERENCES

url:https://github.com/idajea/iot_vuln_1/blob/master/tew632/ntp_sync.md

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2024-57590

Trust: 0.8

sources: JVNDB: JVNDB-2025-006033 // NVD: CVE-2024-57590

SOURCES

db:JVNDBid:JVNDB-2025-006033
db:NVDid:CVE-2024-57590

LAST UPDATE DATE

2025-06-01T23:20:26.745000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2025-006033date:2025-05-30T02:38:00
db:NVDid:CVE-2024-57590date:2025-05-29T16:01:22.487

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2025-006033date:2025-05-30T00:00:00
db:NVDid:CVE-2024-57590date:2025-01-27T15:15:11.463