Impact
The vulnerability allows an attacker to inject arbitrary operating‑system commands through the wl_enrolee_pin parameter in the add_wps_client function of the setup.cgi web interface. This is a classic OS command injection flaw, mapped to CWE‑77 and CWE‑78. If successfully exploited, an attacker can execute any commands on the device, compromising the confidentiality, integrity and availability of the network equipment.
Affected Systems
The affected hardware is the Trendnet TEW‑657BRM wireless router, firmware version 1.00.1, which has been end of life for more than fourteen years. The product is no longer supported by the vendor, and no patch or update is available. Only this specific firmware release is known to contain the flaw, accessible via the standard web management portal.
Risk and Exploitability
CVSS v3.1 gives the bug a score of 5.3, indicating moderate severity. The EPSS probability is 1 %, suggesting low likelihood of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. However, exploitation code is publicly available and the flaw can be triggered remotely by anyone who can reach the router’s web interface. Because the device is discontinued, the safest posture is to remove it from exposure or replace it with a supported alternative.
OpenCVE Enrichment