Impact
The vulnerability resides in the Edit function of /setup.cgi in Trendnet TEW-657BRM firmware 1.00.1, where improper validation of the pcdb_list argument permits an attacker to inject arbitrary operating‑system commands. Successful exploitation would allow remote execution of any shell command on the device, potentially leading to full control of the appliance. This weakness is classified as command injection (CWE-77) and process control abuse (CWE-78).
Affected Systems
Trendnet TEW-657BRM routers running firmware version 1.00.1 are affected. The device has been discontinued and reached end‑of‑life on June 23, 2011, and is no longer supported by the vendor, meaning no security updates will be provided.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity, and while the EPSS score is not available, the vulnerability has been publicly disclosed and can be triggered remotely via the web interface. Because the product is already EOL and unmaintained, the risk of exploitation remains as long as the device is in use, especially if it is exposed to the internet or an untrusted network.
OpenCVE Enrichment