Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15472: OS Command Injection in TRENDnet TEW-811DRU

0
High
VulnerabilityCVE-2025-15472cvecve-2025-15472
Published: Tue Jan 06 2026 (01/06/2026, 22:02:06 UTC)
Source: CVE Database V5
Vendor/Project: TRENDnet
Product: TEW-811DRU

Description

A flaw has been found in TRENDnet TEW-811DRU 1.0.2.0. This affects the function setDeviceURL  of the file uapply.cgi of the component httpd . This manipulation of the argument DeviceURL causes os command injection. The attack can be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/14/2026, 01:48:29 UTC

Technical Analysis

CVE-2025-15472 is an OS command injection vulnerability identified in the TRENDnet TEW-811DRU wireless router, specifically version 1.0.2.0. The vulnerability resides in the setDeviceURL function of the uapply.cgi script, part of the device's embedded HTTP server (httpd). An attacker can remotely manipulate the DeviceURL parameter to inject arbitrary operating system commands, which the device executes with elevated privileges. This flaw does not require user interaction or authentication but does require the attacker to have high privileges, indicating that exploitation may be possible after initial access or through other means to elevate privileges. The vulnerability has a CVSS 4.0 base score of 8.6, reflecting its high severity due to network attack vector, low attack complexity, no user interaction, and high impact on confidentiality, integrity, and availability. Although the vendor was notified early, no patch or mitigation guidance has been released, and public exploit code is available, increasing the risk of exploitation. The vulnerability could allow attackers to fully compromise the device, execute arbitrary commands, disrupt network services, or use the device as a foothold for lateral movement within an organization's network.

Potential Impact

For European organizations, exploitation of CVE-2025-15472 could lead to severe consequences including unauthorized control over network infrastructure devices, data exfiltration, disruption of network availability, and potential pivoting to other internal systems. Given that the affected device is a wireless router, compromise could undermine the security of connected endpoints and sensitive communications. Critical sectors such as government, finance, healthcare, and industrial operations relying on TRENDnet TEW-811DRU devices may face operational disruptions and data breaches. The lack of vendor response and patch availability increases the window of exposure, making timely detection and mitigation essential. Additionally, the presence of public exploit code lowers the barrier for attackers, including cybercriminals and state-sponsored actors targeting European entities. This vulnerability could also be leveraged in botnet formation or ransomware campaigns, amplifying its impact on European digital infrastructure.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate compensating controls. These include disabling remote management interfaces on the TEW-811DRU devices if not strictly necessary, restricting device management access to trusted internal networks only, and applying strict firewall rules to block unauthorized inbound traffic to the device's HTTP server. Network segmentation should isolate vulnerable devices from critical systems to limit lateral movement. Continuous monitoring for anomalous command execution or unexpected network traffic originating from these routers is crucial. Organizations should also consider replacing affected devices with updated hardware from vendors with active security support. Where possible, conducting internal penetration testing to identify exploitation attempts and educating IT staff about this vulnerability will enhance preparedness. Finally, organizations should maintain up-to-date asset inventories to identify all affected devices promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-06T16:28:05.486Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695d893f65deeab1b93cbef3

Added to database: 1/6/2026, 10:14:23 PM

Last enriched: 1/14/2026, 1:48:29 AM

Last updated: 2/7/2026, 7:39:33 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats