Impact
The TEW‑713RE firmware up to version 1.02 contains a flaw in the sub_421494 function of the web interface /goform/addRouting. A crafted value for the dest parameter allows remote execution of arbitrary shell commands, compromising the device’s confidentiality, integrity, and availability. This vulnerability is a classic command injection, directly leveraging unsanitized input to gain execution rights.
Affected Systems
The affected routers are TRENDnet TEW‑713RE units running firmware 1.02 or earlier. No earlier firmware versions are mentioned, so the scope is limited to this generation of devices.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate level of risk. EPSS is below 1 % and the vulnerability is not listed in KEV, suggesting a low current exploitation rate. The likely attack vector, based on the description, is a remote connection to the router’s web interface, which may be accessible from the local or wider network. Because the vendor has not released a fix, the threat persists until a patch is applied or until the vulnerable interface is mitigated through network controls.
OpenCVE Enrichment