This is a remote stack-based buffer overflow vulnerability affecting TRENDnet TEW-632BRP routers with firmware version 1.010B32. Attackers can trigger the flaw via a malicious HTTP POST request to the ping_response.cgi endpoint. Successful exploitation could allow arbitrary code execution or device takeover, and public exploit code is available.
Remediation
Restrict external access to the router's administrative interface from the public internet. The vendor did not respond to disclosure, so no official patch is available. Replace this end-of-life device with a supported, updated router from the vendor to eliminate persistent risk.
Exploit info
The exploit has been released to the public (for example, see https://app.opencve.io/cve/CVE-2026-4172 or https://vuldb.com/). | Potential exploit details can be searched in Exploit-DB or GitHub: https://www.exploit-db.com/search?cve=CVE-2026-4172 | https://github.com/search?q=CVE-2026-4172+exploit
TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.