Description
A weakness has been identified in TRENDnet TEW-821DAP 1.12B01. This issue affects the function find_hwid/new_gui_update_firmware of the component Firmware Update Handler. Executing a manipulation of the argument dest can lead to insufficient verification of data authenticity. The attack can be launched remotely. Attacks of this nature are highly complex. The exploitability is assessed as difficult. The vendor explains: "That firmware version will only work on our hardware version v1.xR. We have already EOL that product 8 years ago and are no longer selling". This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-05-02
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises from a failure to fully verify the authenticity of firmware data when the firmware update interface processes the argument dest in the new_gui_update_firmware function. This weakness, classified as CWE‑345, allows an attacker to potentially inject and install tampered firmware without proper authentication, leading to unauthorized control of the device.

Affected Systems

Affected devices are TRENDnet TEW‑821DAP routers running firmware version 1.12B01, which support only hardware revision v1.xR. The product has been end‑of‑life for approximately eight years, and it is no longer sold or supported by TRENDnet.

Risk and Exploitability

The CVSS score of 6.3 indicates a moderate severity. Because the product is EOL, the practical risk is mitigated, but the absence of a publicly available patch and the fact that the exploit requires complex interaction reduce immediate threat. The EPSS score is not published, and the vulnerability is not listed in the CISA KEV catalog. A remote attacker would need to craft a specific payload that manipulates the dest argument during a firmware update session; the attack is deemed difficult and highly complex, and no evidence of active exploitation is known.

Generated by OpenCVE AI on May 2, 2026 at 09:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify firmware files against official vendor hashes before applying updates.
  • Disable or block the router’s remote firmware update endpoint, if the configuration interface allows it.
  • Replace the deprecated TEW‑821DAP hardware with a supported, actively maintained model that receives security updates.

Generated by OpenCVE AI on May 2, 2026 at 09:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Trendnet tew-821dap
Vendors & Products Trendnet tew-821dap

Sat, 02 May 2026 07:30:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in TRENDnet TEW-821DAP 1.12B01. This issue affects the function find_hwid/new_gui_update_firmware of the component Firmware Update Handler. Executing a manipulation of the argument dest can lead to insufficient verification of data authenticity. The attack can be launched remotely. Attacks of this nature are highly complex. The exploitability is assessed as difficult. The vendor explains: "That firmware version will only work on our hardware version v1.xR. We have already EOL that product 8 years ago and are no longer selling". This vulnerability only affects products that are no longer supported by the maintainer.
Title TRENDnet TEW-821DAP Firmware Update new_gui_update_firmware data authenticity
First Time appeared Trendnet
Trendnet tew-821dap Firmware
Weaknesses CWE-345
CPEs cpe:2.3:o:trendnet:tew-821dap_firmware:*:*:*:*:*:*:*:*
Vendors & Products Trendnet
Trendnet tew-821dap Firmware
References
Metrics cvssV2_0

{'score': 2.6, 'vector': 'AV:N/AC:H/Au:N/C:N/I:P/A:N/E:ND/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.7, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:X/RL:X/RC:R'}

cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:X/RL:X/RC:R'}

cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X'}


Subscriptions

Trendnet Tew-821dap Tew-821dap Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-02T06:45:10.258Z

Reserved: 2026-05-01T12:07:25.142Z

Link: CVE-2026-7606

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-02T08:16:27.967

Modified: 2026-05-02T08:16:27.967

Link: CVE-2026-7606

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T10:00:06Z

Weaknesses