Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15471: OS Command Injection in TRENDnet TEW-713RE

0
Critical
VulnerabilityCVE-2025-15471cvecve-2025-15471
Published: Tue Jan 06 2026 (01/06/2026, 21:32:06 UTC)
Source: CVE Database V5
Vendor/Project: TRENDnet
Product: TEW-713RE

Description

A vulnerability was detected in TRENDnet TEW-713RE 1.02. The impacted element is an unknown function of the file /goformX/formFSrvX. The manipulation of the argument SZCMD results in os command injection. It is possible to launch the attack remotely. The exploit is now public and may be used. The vendor confirms: "The product in question TEW-731RE for CVE-2025-15471 has been discontinued and end of life since October 23, 2020. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on the website product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/18/2026, 18:22:50 UTC

Technical Analysis

The vulnerability identified as CVE-2025-15471 affects the TRENDnet TEW-713RE wireless range extender running firmware version 1.02. It is an OS command injection flaw located in an unspecified function of the /goformX/formFSrvX endpoint. Attackers can manipulate the SZCMD parameter to inject and execute arbitrary operating system commands remotely without requiring authentication or user interaction. This means an attacker can gain full control over the device remotely, potentially leading to complete compromise of the device and its network environment. The vulnerability has a CVSS 4.0 base score of 9.3, indicating critical severity due to its network attack vector, no required privileges, no user interaction, and high impact on confidentiality, integrity, and availability. The vendor has discontinued the TEW-713RE product line since October 2020 and does not provide patches or support, leaving affected devices permanently vulnerable. The exploit code is publicly available, increasing the risk of exploitation by threat actors. No confirmed active exploitation has been reported yet, but the availability of public exploits and the critical nature of the vulnerability make it a significant threat. The lack of vendor patches necessitates alternative mitigation strategies such as device replacement or network isolation. This vulnerability highlights risks associated with legacy IoT and networking hardware that remains in use beyond its support lifecycle.

Potential Impact

The impact of CVE-2025-15471 is severe for organizations still operating the TRENDnet TEW-713RE device. Successful exploitation allows remote attackers to execute arbitrary OS commands, potentially leading to full device compromise. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, deployment of malware or ransomware, and use of the device as a pivot point for further attacks. Confidentiality, integrity, and availability of network resources can be severely affected. Since the device is often deployed in home or small office environments, compromised devices could be used as entry points into larger organizational networks if connected improperly. The lack of vendor support and patches means that vulnerabilities cannot be remediated through updates, increasing the risk over time. Organizations relying on these devices face persistent exposure, and attackers may exploit this vulnerability to establish persistent footholds or disrupt network operations. The public availability of exploit code further elevates the threat level, facilitating automated or mass exploitation campaigns.

Mitigation Recommendations

Given the absence of vendor patches due to end-of-life status, organizations must adopt alternative mitigation strategies. The most effective measure is to immediately replace the TRENDnet TEW-713RE devices with supported, updated hardware from reputable vendors. If replacement is not immediately feasible, network segmentation should be implemented to isolate these vulnerable devices from critical infrastructure and sensitive data. Disable remote management interfaces and restrict device access to trusted internal networks only. Employ firewall rules to block inbound traffic targeting the vulnerable endpoint (/goformX/formFSrvX) or suspicious command injection attempts. Monitor network traffic for unusual activity indicative of exploitation attempts. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation of this vulnerability. Educate users and administrators about the risks of using unsupported legacy devices. Maintain an inventory of all network devices to identify and track unsupported hardware. Lastly, plan and budget for timely hardware lifecycle management to avoid similar risks in the future.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-06T16:27:58.441Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695d818706d60d7483a4bf75

Added to database: 1/6/2026, 9:41:27 PM

Last enriched: 3/18/2026, 6:22:50 PM

Last updated: 3/25/2026, 2:47:37 AM

Views: 97

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses