{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-4354","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-03-17T18:23:31.433Z","datePublished":"2026-03-17T23:32:11.394Z","dateUpdated":"2026-03-18T20:19:29.923Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-03-17T23:32:11.394Z"},"title":"TRENDnet TEW-824DRU Web apply_sec.cgi sub_420A78 cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"Cross Site Scripting"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"Code Injection"}]}],"affected":[{"vendor":"TRENDnet","product":"TEW-824DRU","versions":[{"version":"1.010B01","status":"affected"},{"version":"1.04B01","status":"affected"}],"cpes":["cpe:2.3:o:trendnet:tew-824dru_firmware:*:*:*:*:*:*:*:*"],"modules":["Web Interface"]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in TRENDnet TEW-824DRU 1.010B01/1.04B01. The impacted element is the function sub_420A78 of the file apply_sec.cgi of the component Web Interface. Such manipulation of the argument Language leads to cross site scripting. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-03-17T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-03-17T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-03-17T19:28:37.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"iC0rner (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB","type":"coordinator"}],"references":[{"url":"https://vuldb.com/?id.351381","name":"VDB-351381 | TRENDnet TEW-824DRU Web apply_sec.cgi sub_420A78 cross site scripting","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.351381","name":"VDB-351381 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.772660","name":"Submit #772660 | TRENDnet TEW-824DRU v1.04B01 Denial of Service","tags":["third-party-advisory"]},{"url":"https://github.com/i-Corner/cve/issues/41","tags":["exploit","issue-tracking"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-18T20:19:23.603295Z","id":"CVE-2026-4354","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-18T20:19:29.923Z"}}]}}