The TRENDnet TI-PG1284i switch(hw v2.0R) prior to version 2.0.2.S0 suffers from an integer underflow vulnerability. This vulnerability exists in its lldp related component. Due to lack of proper validation on length field of PortID TLV, by sending a crafted lldp packet to the device, integer underflow would occur and the negative number will be passed to memcpy() later, which may cause buffer overflow or invalid memory access.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| trendnet | ti-pg1284i_firmware | 2.0.2.s0 | - |
| trendnet | ti-g102i_firmware | - | - |
| trendnet | ti-g160i_firmware |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9
Affected Products
2
References
trendnet / ti-pg1284i_firmware
| - |
| - |
| trendnet | ti-g642i_firmware | - | - |
| trendnet | ti-pg102i_firmware | - | - |
| trendnet | ti-pg541i_firmware | - | - |
| trendnet | ti-rp262i_firmware | - | - |
| trendnet | teg-30102ws_firmware | - | - |
| trendnet | tpe-30102ws_firmware | - | - |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitability
Impact