Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://github.com/WhereisRain/TEW-657BRM |
|
Fri, 28 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-78 | |
| Metrics |
cvssV3_1
|
Thu, 27 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Trendnet
Trendnet tew-657brm |
|
| Vendors & Products |
Trendnet
Trendnet tew-657brm |
Wed, 26 Nov 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TRENDnet TEW-657BRM 1.00.1 has an authenticated remote OS command injection vulnerability in the setup.cgi binary, exploitable via the HTTP parameters "command", "todo", and "next_file," which allows an attacker to execute arbitrary commands with root privileges. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-28T14:17:06.184Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65202
Updated: 2025-11-28T14:16:53.287Z
Status : Awaiting Analysis
Published: 2025-11-26T21:15:46.533
Modified: 2025-12-01T15:39:33.110
Link: CVE-2025-65202
No data.
OpenCVE Enrichment
Updated: 2025-11-27T16:25:52Z