Impact
A security flaw occurs in the /setup.cgi vpn_drop handler of Trendnet TEW‑657BRM firmware 1.00.1. The policy_name parameter is used without proper validation, enabling an attacker to execute arbitrary shell commands on the underlying operating system. This represents an OS command injection vulnerability (CWE‑78) and also a command path injection flaw (CWE‑77). If exploited, the attacker gains remote command execution capability via the device’s management web interface.
Affected Systems
Only the Trendnet TEW‑657BRM model running firmware version 1.00.1 is identified as vulnerable. The device has been out of support since June 23 2011 and is no longer maintained by the vendor, so no official patch or update is available.
Risk and Exploitability
According to the score system, the CVSS base score is 5.3, indicating moderate severity, while the EPSS probability is 1 %. The vulnerability is not listed in the CISA KEV catalogue. Attackers would need network reachability to the device’s HTTP management interface to send a crafted policy_name value. Without a vendor fix, the risk remains elevated for any environment still operating the hardware, as remote code execution could lead to full control of the network appliance.
OpenCVE Enrichment