Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15471: OS Command Injection in TRENDnet TEW-713RE

0
Critical
VulnerabilityCVE-2025-15471cvecve-2025-15471
Published: Tue Jan 06 2026 (01/06/2026, 21:32:06 UTC)
Source: CVE Database V5
Vendor/Project: TRENDnet
Product: TEW-713RE

Description

A vulnerability was detected in TRENDnet TEW-713RE 1.02. The impacted element is an unknown function of the file /goformX/formFSrvX. The manipulation of the argument SZCMD results in os command injection. It is possible to launch the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/06/2026, 21:55:48 UTC

Technical Analysis

CVE-2025-15471 is a remote OS command injection vulnerability identified in TRENDnet TEW-713RE routers running firmware version 1.02. The vulnerability resides in an unspecified function accessed via the /goformX/formFSrvX endpoint, where the SZCMD parameter is improperly sanitized, allowing attackers to inject arbitrary operating system commands. This flaw can be exploited remotely without any authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 base score of 9.3 reflects the critical nature of this vulnerability, with a vector indicating network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. The vendor was informed early but has not issued any patches or advisories, and a public exploit has been released, increasing the risk of widespread exploitation. Successful exploitation could lead to full device compromise, enabling attackers to execute arbitrary commands, potentially pivot within networks, intercept or manipulate traffic, and disrupt services. The lack of vendor response and patch availability exacerbates the threat, leaving affected devices exposed. The vulnerability primarily impacts the TRENDnet TEW-713RE model, commonly used in small office/home office environments, which may be deployed in various organizational contexts including European enterprises and critical infrastructure.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the potential for complete device compromise without any authentication. Exploitation could lead to unauthorized access to internal networks, interception and manipulation of sensitive data, disruption of network services, and use of compromised devices as footholds for further attacks. Small and medium enterprises (SMEs) and home office setups using the TRENDnet TEW-713RE are particularly vulnerable, as these environments often lack robust network segmentation and monitoring. Critical sectors such as finance, healthcare, and government agencies relying on these devices for network connectivity could face operational disruptions and data breaches. The public availability of an exploit increases the likelihood of automated attacks and widespread exploitation across Europe. Additionally, the absence of vendor patches means organizations must rely on network-level mitigations or device replacement, complicating incident response and remediation efforts.

Mitigation Recommendations

Given the absence of vendor patches, European organizations should immediately identify and isolate all TRENDnet TEW-713RE devices running firmware version 1.02. Network segmentation should be enforced to restrict access to these devices, especially blocking inbound traffic to the /goformX/formFSrvX endpoint from untrusted networks. Implement strict firewall rules to limit management interface exposure to internal trusted networks only. Deploy intrusion detection and prevention systems (IDS/IPS) with signatures targeting this vulnerability and monitor network traffic for suspicious command injection patterns. Where possible, replace affected devices with models from vendors providing timely security updates. For environments where replacement is not immediately feasible, consider disabling remote management features and enforcing strong network access controls. Regularly review logs for signs of exploitation attempts and educate users about the risks associated with vulnerable network equipment. Engage with TRENDnet support channels to seek updates or advisories, and maintain awareness of any future patches or mitigations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-06T16:27:58.441Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695d818706d60d7483a4bf75

Added to database: 1/6/2026, 9:41:27 PM

Last enriched: 1/6/2026, 9:55:48 PM

Last updated: 1/8/2026, 5:28:04 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats