Impact
The vulnerability resides in the /goform/setSysAdm endpoint of TRENDnet TEW-713RE firmware versions up to 1.02. It allows an attacker to supply a crafted admuser argument that causes the device to execute arbitrary shell commands. This command injection can lead to remote code execution, potentially compromising the confidentiality, integrity, and availability of the device and associated network resources. The flaw is a command injection (CWE-74) and arbitrary command execution (CWE-77) issue.
Affected Systems
The affected product is TRENDnet TEW-713RE running firmware version 1.02 or earlier. No other vendors or products are listed as vulnerable. The flaw applies to all units with the specified firmware, regardless of network configuration, as long as the management interface is reachable.
Risk and Exploitability
The CVSS score of 5.3 rates this issue as moderate severity; the EPSS score of < 1% indicates a very low probability of exploitation, although public exploits are known. The attack can be launched remotely over the network by sending a specially crafted request to /goform/setSysAdm. The CVE does not specify any authentication requirements; however, the device’s management interface must be reachable to exploit the flaw. The vulnerability is not listed in CISA’s KEV catalog.
OpenCVE Enrichment