Impact
The vulnerability lies in the update_pcdb function within /setup.cgi, where an attacker can supply a crafted mac_pc_dba parameter that overflows a stack buffer. This stack-based buffer overflow can allow the execution of arbitrary code on the device, compromising confidentiality, integrity, and availability of the affected router.
Affected Systems
The flaw affects Trendnet TEW‑657BRM routers running firmware version 1.00.1. This model was discontinued and declared end‑of‑life in June 2011, and the vendor no longer provides security support or firmware updates for it.
Risk and Exploitability
The CVSS score is 8.7, indicating high severity. A public exploit has already been released, and the vulnerability can be triggered remotely. No EPSS data is available and the issue is not listed in CISA's KEV catalog. Because the device is out of support and a remote attacker can gain full control, the risk remains significant and immediate attention is required.
OpenCVE Enrichment