Impact
The flaw occurs in the add_wps_client function of /setup.cgi on Trendnet TEW‑657BRM firmware 1.00.1. By manipulating the wl_enrolee_pin argument, an attacker can inject and execute arbitrary operating‑system commands. This allows the attacker to gain remote control over the device, potentially accessing configuration files, telnet, or other services exposed by the router.
Affected Systems
Trendnet TEW‑657BRM, firmware release 1.00.1. The device has been discontinued and reached end of life on June 23 2011; the vendor no longer provides support or security updates.
Risk and Exploitability
The CVSS base score of 5.3 indicates moderate severity. No EPSS value is available and the vulnerability is not listed in the CISA KEV catalog. Because the device is no longer supported, any exposed systems remain vulnerable unless isolated or replaced. The attack vector is remote, requiring network connectivity to the device’s web interface.
OpenCVE Enrichment