{"vulnerability": "cve-2024-42813", "sightings": [{"uuid": "c0c50e28-1ace-4881-a6aa-e08f789964f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-42813", "type": "seen", "source": "https://t.me/cvedetector/3560", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42813 - TRENDnet TEW-752DRU Remote Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-42813 \nPublished : Aug. 19, 2024, 8:15 p.m. | 22\u00a0minutes ago \nDescription : In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-19T22:43:30.000000Z"}]}