Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15472: OS Command Injection in TRENDnet TEW-811DRU

0
High
VulnerabilityCVE-2025-15472cvecve-2025-15472
Published: Tue Jan 06 2026 (01/06/2026, 22:02:06 UTC)
Source: CVE Database V5
Vendor/Project: TRENDnet
Product: TEW-811DRU

Description

A flaw has been found in TRENDnet TEW-811DRU 1.0.2.0. This affects the function setDeviceURL  of the file uapply.cgi of the component httpd . This manipulation of the argument DeviceURL causes os command injection. The attack can be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/06/2026, 22:28:47 UTC

Technical Analysis

CVE-2025-15472 is an OS command injection vulnerability identified in TRENDnet TEW-811DRU routers running firmware version 1.0.2.0. The vulnerability resides in the setDeviceURL function of the uapply.cgi script, part of the device's embedded HTTP server (httpd). Specifically, the DeviceURL parameter is improperly sanitized, allowing an attacker to inject arbitrary operating system commands. This flaw can be exploited remotely without requiring user interaction, but it does require the attacker to have high privileges, which implies some form of prior access or credential compromise. The vulnerability has been assigned a CVSS 4.0 base score of 8.6, reflecting its high impact on confidentiality, integrity, and availability. The vendor was contacted but has not issued any patch or mitigation guidance, increasing the risk of exploitation. Although no known exploits are currently observed in the wild, proof-of-concept code has been published, raising the likelihood of future attacks. The flaw could allow attackers to execute arbitrary commands on the device, potentially leading to full device compromise, network pivoting, data exfiltration, or denial of service. The lack of authentication bypass means that attackers must already have elevated privileges, but the remote exploitability and absence of user interaction requirements make this vulnerability particularly dangerous in environments where the device is exposed or credentials are weak. The TEW-811DRU is used in various enterprise and small business networks, making this a significant threat to network security.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for those relying on TRENDnet TEW-811DRU devices in their network infrastructure. Successful exploitation could lead to unauthorized command execution, resulting in data breaches, network disruption, or lateral movement within corporate networks. This could compromise sensitive information, disrupt business operations, and damage organizational reputation. Critical infrastructure sectors such as finance, healthcare, and government agencies using these devices are particularly vulnerable. The high CVSS score reflects the potential for severe confidentiality, integrity, and availability impacts. Additionally, the absence of vendor patches increases the window of exposure, making timely mitigation essential. The threat is exacerbated in environments where remote management interfaces are exposed to the internet or where credential hygiene is poor. European organizations must consider the risk of targeted attacks exploiting this vulnerability, especially given geopolitical tensions that may motivate adversaries to exploit such weaknesses in critical networks.

Mitigation Recommendations

Given the lack of an official patch from TRENDnet, European organizations should implement immediate compensating controls. First, disable remote management interfaces on the TEW-811DRU devices to prevent external access to the vulnerable HTTP endpoint. Second, segment networks to isolate these devices from critical assets and limit lateral movement if compromise occurs. Third, enforce strong credential policies and rotate any default or weak passwords to reduce the risk of privilege escalation. Fourth, deploy network intrusion detection systems (NIDS) or web application firewalls (WAF) to monitor and block suspicious HTTP requests targeting the uapply.cgi endpoint with malicious DeviceURL parameters. Fifth, conduct regular firmware audits and consider replacing affected devices with models from vendors that provide timely security updates. Finally, maintain vigilant monitoring of network logs for unusual command execution patterns or device behavior indicative of exploitation attempts. Organizations should also prepare incident response plans specific to this vulnerability to rapidly contain and remediate any breaches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-06T16:28:05.486Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695d893f65deeab1b93cbef3

Added to database: 1/6/2026, 10:14:23 PM

Last enriched: 1/6/2026, 10:28:47 PM

Last updated: 1/8/2026, 10:14:26 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats