Description
A weakness has been identified in Trendnet TEW-657BRM 1.00.1. This affects the function add_wps_client of the file /setup.cgi. This manipulation of the argument wl_enrolee_pin causes os command injection. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor confirms, that "[t]he product in question (...) has been discontinued and end of life since June 23, 2011, that is more than 14 years ago. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on our website's product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-04-02
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Assess Impact
AI Analysis

Impact

The flaw occurs in the add_wps_client function of /setup.cgi on Trendnet TEW‑657BRM firmware 1.00.1. By manipulating the wl_enrolee_pin argument, an attacker can inject and execute arbitrary operating‑system commands. This allows the attacker to gain remote control over the device, potentially accessing configuration files, telnet, or other services exposed by the router.

Affected Systems

Trendnet TEW‑657BRM, firmware release 1.00.1. The device has been discontinued and reached end of life on June 23 2011; the vendor no longer provides support or security updates.

Risk and Exploitability

The CVSS base score of 5.3 indicates moderate severity. No EPSS value is available and the vulnerability is not listed in the CISA KEV catalog. Because the device is no longer supported, any exposed systems remain vulnerable unless isolated or replaced. The attack vector is remote, requiring network connectivity to the device’s web interface.

Generated by OpenCVE AI on April 2, 2026 at 22:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Determine whether the Trendnet TEW‑657BRM is still deployed in your environment.
  • If the device remains in use, replace it with a supported router model and ensure the firmware is up‑to‑date.
  • Disable WPS or block remote management access to the device so that the vulnerable CGI file is not reachable from outside the local network.
  • Implement network segmentation or VLAN isolation to prevent lateral movement to the legacy equipment.
  • Monitor inbound traffic for anomalous requests to /setup.cgi and for signs of command execution or unusual bandwidth usage.

Generated by OpenCVE AI on April 2, 2026 at 22:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Trendnet tew-657brm
Vendors & Products Trendnet tew-657brm

Thu, 02 Apr 2026 16:00:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Trendnet TEW-657BRM 1.00.1. This affects the function add_wps_client of the file /setup.cgi. This manipulation of the argument wl_enrolee_pin causes os command injection. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor confirms, that "[t]he product in question (...) has been discontinued and end of life since June 23, 2011, that is more than 14 years ago. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on our website's product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer.
Title Trendnet TEW-657BRM setup.cgi add_wps_client os command injection
First Time appeared Trendnet
Trendnet tew-657brm Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:trendnet:tew-657brm_firmware:*:*:*:*:*:*:*:*
Vendors & Products Trendnet
Trendnet tew-657brm Firmware
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Trendnet Tew-657brm Tew-657brm Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-03T19:58:42.244Z

Reserved: 2026-04-01T16:47:08.739Z

Link: CVE-2026-5351

cve-icon Vulnrichment

Updated: 2026-04-03T19:58:36.458Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-02T16:16:28.093

Modified: 2026-04-03T16:10:23.730

Link: CVE-2026-5351

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:18:42Z

Weaknesses