Description
A vulnerability was detected in TRENDnet TEW-821DAP up to 1.12B01. The affected element is the function tools_diagnostic. The manipulation results in os command injection. The exploit is now public and may be used. The vendor explains: "That firmware version will only work on our hardware version v1.xR. We have already EOL that product 8 years ago and are no longer selling". This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-05-02
Score: 5.1 Medium
EPSS: 1.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the tools_diagnostic function of TRENDnet TEW‑821DAP firmware up to version 1.12B01 and allows an attacker to inject arbitrary operating‑system commands. This can lead to remote code execution on the device, compromising its confidentiality, integrity, and availability. The weakness corresponds to CWE‑77 (OS Command Injection) and CWE‑78 (OS Command Injection via Environment Variable).

Affected Systems

Affected hardware is the TRENDnet TEW‑821DAP router, specifically firmware versions up to 1.12B01 that run on the v1.xR hardware revision. That firmware is no longer supported by TRENDnet, which ceased selling the product eight years ago.

Risk and Exploitability

The CVSS base score of 5.1 indicates moderate impact. The EPSS score is 1%, which implies a very low but non‑zero probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog, suggesting limited documented exploitation. The known public exploit indicates that an attacker who can reach the device’s diagnostics interface — via network or local management interface — could trigger the injection. The lack of a current support contract and absence of a fixed version means the risk remains unless mitigated through other controls.

Generated by OpenCVE AI on May 2, 2026 at 14:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a newer, supported model that does not include the vulnerable tools_diagnostic function.
  • If an upgrade is not feasible, restrict access to the diagnostics interface by implementing firewall rules or device access control lists.
  • Segment the network so that the router’s management interface is isolated from untrusted subnets and only reachable by authorized management hosts.

Generated by OpenCVE AI on May 2, 2026 at 14:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Trendnet tew-821dap
Vendors & Products Trendnet tew-821dap

Sat, 02 May 2026 09:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in TRENDnet TEW-821DAP up to 1.12B01. The affected element is the function tools_diagnostic. The manipulation results in os command injection. The exploit is now public and may be used. The vendor explains: "That firmware version will only work on our hardware version v1.xR. We have already EOL that product 8 years ago and are no longer selling". This vulnerability only affects products that are no longer supported by the maintainer.
Title TRENDnet TEW-821DAP tools_diagnostic os command injection
First Time appeared Trendnet
Trendnet tew-821dap Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:trendnet:tew-821dap_firmware:*:*:*:*:*:*:*:*
Vendors & Products Trendnet
Trendnet tew-821dap Firmware
References
Metrics cvssV2_0

{'score': 5.2, 'vector': 'AV:A/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.5, 'vector': 'CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Trendnet Tew-821dap Tew-821dap Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-02T08:45:12.294Z

Reserved: 2026-05-01T12:07:31.537Z

Link: CVE-2026-7608

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-02T09:16:22.657

Modified: 2026-05-02T09:16:22.657

Link: CVE-2026-7608

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T14:45:44Z

Weaknesses