CVE-2025-15136: Command Injection in TRENDnet TEW-800MB
A security vulnerability has been detected in TRENDnet TEW-800MB 1.0.1.0. Affected is the function do_setWizard_asp of the file /goform/wizardset of the component Management Interface. The manipulation of the argument WizardConfigured leads to command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-15136 is a critical command injection vulnerability identified in the TRENDnet TEW-800MB router firmware version 1.0.1.0. The vulnerability resides in the do_setWizard_asp function of the /goform/wizardset endpoint within the device's management interface. Specifically, the WizardConfigured parameter is improperly sanitized, allowing an attacker to inject arbitrary operating system commands. This flaw can be exploited remotely over the network without requiring authentication or user interaction, making it highly accessible to attackers. The vulnerability enables full compromise of the device, potentially allowing attackers to execute arbitrary commands with elevated privileges, leading to unauthorized access, data exfiltration, device manipulation, or network pivoting. Despite early vendor notification, no patch or mitigation guidance has been provided, and public exploit code has been disclosed, increasing the risk of active exploitation. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation. The lack of scope change indicates the attack affects only the vulnerable device itself but can have cascading effects on connected networks. This vulnerability is particularly concerning for organizations relying on TRENDnet TEW-800MB devices in their network infrastructure, as it undermines the security of network management and can serve as a foothold for further attacks.
Potential Impact
For European organizations, this vulnerability presents a significant threat to network security and operational continuity. Exploitation can lead to full device compromise, allowing attackers to intercept or manipulate network traffic, disrupt connectivity, or use the device as a launchpad for lateral movement within corporate networks. Confidential information traversing or stored on the device may be exposed, and attackers could alter device configurations to create persistent backdoors. Critical sectors such as finance, healthcare, and government, which often rely on robust network infrastructure, could face severe disruptions or data breaches. The absence of a vendor patch increases the window of exposure, and public exploit availability raises the likelihood of opportunistic attacks. Organizations with remote management enabled or insufficient network segmentation are particularly vulnerable. Additionally, compromised devices could be conscripted into botnets, amplifying the threat landscape beyond individual organizations. The impact extends to regulatory compliance risks under GDPR if personal data is compromised due to this vulnerability.
Mitigation Recommendations
Given the lack of an official patch, European organizations should implement immediate compensating controls. First, disable remote management interfaces on the TRENDnet TEW-800MB devices to prevent external exploitation. Restrict network access to the management interface using firewall rules or VLAN segmentation, limiting it to trusted administrative hosts only. Monitor network traffic for unusual patterns or command injection attempts targeting the /goform/wizardset endpoint. Employ intrusion detection/prevention systems with updated signatures to detect exploitation attempts. Regularly audit device configurations and logs for signs of compromise. Where feasible, replace affected devices with models from vendors providing timely security updates. Establish strict network segmentation to isolate vulnerable devices from critical systems. Educate IT staff about this vulnerability and ensure incident response plans include scenarios involving network device compromise. Finally, maintain vigilance for any future vendor advisories or patches and apply them promptly upon release.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-15136: Command Injection in TRENDnet TEW-800MB
Description
A security vulnerability has been detected in TRENDnet TEW-800MB 1.0.1.0. Affected is the function do_setWizard_asp of the file /goform/wizardset of the component Management Interface. The manipulation of the argument WizardConfigured leads to command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-15136 is a critical command injection vulnerability identified in the TRENDnet TEW-800MB router firmware version 1.0.1.0. The vulnerability resides in the do_setWizard_asp function of the /goform/wizardset endpoint within the device's management interface. Specifically, the WizardConfigured parameter is improperly sanitized, allowing an attacker to inject arbitrary operating system commands. This flaw can be exploited remotely over the network without requiring authentication or user interaction, making it highly accessible to attackers. The vulnerability enables full compromise of the device, potentially allowing attackers to execute arbitrary commands with elevated privileges, leading to unauthorized access, data exfiltration, device manipulation, or network pivoting. Despite early vendor notification, no patch or mitigation guidance has been provided, and public exploit code has been disclosed, increasing the risk of active exploitation. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation. The lack of scope change indicates the attack affects only the vulnerable device itself but can have cascading effects on connected networks. This vulnerability is particularly concerning for organizations relying on TRENDnet TEW-800MB devices in their network infrastructure, as it undermines the security of network management and can serve as a foothold for further attacks.
Potential Impact
For European organizations, this vulnerability presents a significant threat to network security and operational continuity. Exploitation can lead to full device compromise, allowing attackers to intercept or manipulate network traffic, disrupt connectivity, or use the device as a launchpad for lateral movement within corporate networks. Confidential information traversing or stored on the device may be exposed, and attackers could alter device configurations to create persistent backdoors. Critical sectors such as finance, healthcare, and government, which often rely on robust network infrastructure, could face severe disruptions or data breaches. The absence of a vendor patch increases the window of exposure, and public exploit availability raises the likelihood of opportunistic attacks. Organizations with remote management enabled or insufficient network segmentation are particularly vulnerable. Additionally, compromised devices could be conscripted into botnets, amplifying the threat landscape beyond individual organizations. The impact extends to regulatory compliance risks under GDPR if personal data is compromised due to this vulnerability.
Mitigation Recommendations
Given the lack of an official patch, European organizations should implement immediate compensating controls. First, disable remote management interfaces on the TRENDnet TEW-800MB devices to prevent external exploitation. Restrict network access to the management interface using firewall rules or VLAN segmentation, limiting it to trusted administrative hosts only. Monitor network traffic for unusual patterns or command injection attempts targeting the /goform/wizardset endpoint. Employ intrusion detection/prevention systems with updated signatures to detect exploitation attempts. Regularly audit device configurations and logs for signs of compromise. Where feasible, replace affected devices with models from vendors providing timely security updates. Establish strict network segmentation to isolate vulnerable devices from critical systems. Educate IT staff about this vulnerability and ensure incident response plans include scenarios involving network device compromise. Finally, maintain vigilance for any future vendor advisories or patches and apply them promptly upon release.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-27T10:01:53.476Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695450b6db813ff03e2bf2f9
Added to database: 12/30/2025, 10:22:46 PM
Last enriched: 12/30/2025, 11:24:45 PM
Last updated: 2/7/2026, 5:11:59 PM
Views: 26
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2090: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.