Description
A flaw has been found in TRENDnet TEW-821DAP up to 1.12B01. The impacted element is the function tools_diagnostic of the file /tmp/diagnostic of the component Firmware Udpate. This manipulation causes os command injection. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor explains: "That firmware version will only work on our hardware version v1.xR. We have already EOL that product 8 years ago and are no longer selling". This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-05-02
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the TEW‑821DAP firmware update diagnostic tool allows attackers to inject arbitrary operating‑system commands, resulting in remote code execution. The vulnerability exists in the tools_diagnostic function of the /tmp/diagnostic component for firmware versions up to 1.12B01. Exploitation can be achieved remotely, and an exploit has already been published and is available for use. This means an attacker could potentially gain full control of the device’s operating system, compromising confidentiality, integrity, and availability of the device.

Affected Systems

The Trendnet TEW‑821DAP wireless access point is affected. Any unit running firmware version 1.12B01 or earlier is vulnerable. Versions higher than 1.12B01 are not known to be impacted, and the product has been out of support for about eight years, with no current releases available from the vendor.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity vulnerability, and the EPSS score is not provided. The issue is not listed in CISA KEV. Because the component is exposed remotely, the likely attack vector is through publicly reachable links or management interfaces. Remote attackers can invoke the vulnerable API to run arbitrary commands on the device. The vulnerability is exploitable from any host that can reach the diagnostic endpoint, making it a high‑risk threat if the device is connected to untrusted networks.

Generated by OpenCVE AI on May 2, 2026 at 11:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Immediately disconnect the TEW‑821DAP from all untrusted networks or block external traffic to the diagnostic endpoint.
  • If the device must remain online, restrict access to the diagnostic tool by applying firewall rules that allow only trusted IP ranges.
  • Monitor system logs for unexpected command execution attempts and consider installing intrusion detection to alert on anomalous activity.

Generated by OpenCVE AI on May 2, 2026 at 11:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Trendnet tew-821dap
Vendors & Products Trendnet tew-821dap

Sat, 02 May 2026 09:30:00 +0000

Type Values Removed Values Added
Description A flaw has been found in TRENDnet TEW-821DAP up to 1.12B01. The impacted element is the function tools_diagnostic of the file /tmp/diagnostic of the component Firmware Udpate. This manipulation causes os command injection. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor explains: "That firmware version will only work on our hardware version v1.xR. We have already EOL that product 8 years ago and are no longer selling". This vulnerability only affects products that are no longer supported by the maintainer.
Title TRENDnet TEW-821DAP Firmware Udpate diagnostic tools_diagnostic os command injection
First Time appeared Trendnet
Trendnet tew-821dap Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:trendnet:tew-821dap_firmware:*:*:*:*:*:*:*:*
Vendors & Products Trendnet
Trendnet tew-821dap Firmware
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Trendnet Tew-821dap Tew-821dap Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-02T09:00:18.863Z

Reserved: 2026-05-01T12:07:34.727Z

Link: CVE-2026-7609

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-02T10:16:19.257

Modified: 2026-05-02T10:16:19.257

Link: CVE-2026-7609

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T11:30:41Z

Weaknesses