Impact
A firmware updater component, platform_do_upgrade_cameo_dev in cameo_dev.sh, does not verify the authenticity of the firmware image. This weakness allows an attacker to supply a crafted firmware file that the device will load, potentially leading to remote code execution or privilege escalation. The attack is possible remotely, the complexity is high, and exploitability is considered difficult.
Affected Systems
All TRENDnet TEW‑821DAP routers running firmware versions up to 1.12B01 are affected. The vendor has ceased support for these models, which means no official patch is currently available.
Risk and Exploitability
With a CVSS score of 6.3, the vulnerability is moderate. The EPSS score is not available, and the vulnerability is not listed in CISA's KEV catalog. Although the attack requires remote access to the update interface and is difficult to execute, an attacker could exploit it to load unsigned firmware, potentially giving full control of the device. Because the product is end‑of‑life, mitigation focuses on network controls rather than patching.
OpenCVE Enrichment