TopVuln

High-risk vulnerability digests

CVE-2026-4172

  • HIGH

Details

CVSS v3
8.6
Affected versions
TRENDnet TEW-632BRP 1.010B32
Summary
This is a remote stack-based buffer overflow vulnerability affecting TRENDnet TEW-632BRP routers with firmware version 1.010B32. Attackers can trigger the flaw via a malicious HTTP POST request to the ping_response.cgi endpoint. Successful exploitation could allow arbitrary code execution or device takeover, and public exploit code is available.
Remediation
Restrict external access to the router's administrative interface from the public internet. The vendor did not respond to disclosure, so no official patch is available. Replace this end-of-life device with a supported, updated router from the vendor to eliminate persistent risk.
Exploit info
The exploit has been released to the public (for example, see https://app.opencve.io/cve/CVE-2026-4172 or https://vuldb.com/). | Potential exploit details can be searched in Exploit-DB or GitHub: https://www.exploit-db.com/search?cve=CVE-2026-4172 | https://github.com/search?q=CVE-2026-4172+exploit

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.