Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5184: Command Injection in TRENDnet TEW-713RE

0
Medium
VulnerabilityCVE-2026-5184cvecve-2026-5184
Published: Tue Mar 31 2026 (03/31/2026, 06:45:22 UTC)
Source: CVE Database V5
Vendor/Project: TRENDnet
Product: TEW-713RE

Description

CVE-2026-5184 is a medium-severity command injection vulnerability affecting TRENDnet TEW-713RE devices running firmware version 1. 02. The flaw exists in the /goform/setSysAdm endpoint, where manipulation of the admuser parameter allows remote attackers to execute arbitrary commands without authentication or user interaction. Although the exploit code is publicly available, no known active exploitation has been reported. The vendor has not responded to disclosure attempts, and no patches are currently available. This vulnerability could allow attackers to compromise device integrity and availability, potentially leading to network disruption or further internal network compromise. Organizations using this device should prioritize mitigation to prevent exploitation. Countries with significant TRENDnet device deployments and strategic network infrastructure reliance are at higher risk. Immediate mitigation steps include network segmentation, disabling remote management, and monitoring for suspicious activity.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 07:08:36 UTC

Technical Analysis

CVE-2026-5184 identifies a command injection vulnerability in the TRENDnet TEW-713RE wireless range extender, specifically in firmware version 1.02. The vulnerability resides in an unspecified function within the /goform/setSysAdm endpoint, where the admuser parameter is improperly sanitized, allowing attackers to inject and execute arbitrary system commands remotely. The attack vector requires no authentication or user interaction, increasing the risk of exploitation. The vulnerability's CVSS 4.0 base score is 5.3 (medium), reflecting its network attack vector, low complexity, and no required privileges or user interaction, but limited impact on confidentiality, integrity, and availability. Public exploit code is available, facilitating potential attacks, although no active exploitation has been observed. The vendor has not issued any patches or advisories, leaving affected devices vulnerable. This flaw could allow attackers to gain control over the device, manipulate its configuration, disrupt network services, or pivot to internal networks. The lack of vendor response and patch availability heightens the urgency for organizations to implement compensating controls. The vulnerability affects a specific firmware version, so identifying and isolating these devices is critical. Given the device’s role as a network extender, compromise could have cascading effects on network security and stability.

Potential Impact

The primary impact of CVE-2026-5184 is unauthorized remote command execution on affected TRENDnet TEW-713RE devices, which can lead to full device compromise. Attackers could alter device configurations, disable security controls, or use the device as a foothold to launch further attacks within internal networks. This threatens the confidentiality, integrity, and availability of network communications passing through or managed by the device. Organizations relying on these devices for network extension or wireless coverage may experience service disruptions, data interception, or lateral movement by attackers. The absence of patches and vendor support increases the risk exposure duration. Critical infrastructure or enterprises using these devices in sensitive environments face elevated risks of operational disruption and data breaches. The exploitability without authentication or user interaction makes it easier for attackers to target these devices remotely, potentially at scale. Overall, the vulnerability undermines network security posture and could facilitate broader compromise if exploited.

Mitigation Recommendations

Given the lack of vendor patches, organizations should implement the following specific mitigations: 1) Immediately identify all TRENDnet TEW-713RE devices running firmware 1.02 within the network through asset inventories and network scans. 2) Disable remote management interfaces or restrict access to trusted IP addresses only, preventing external exploitation. 3) Segment affected devices on isolated network segments to limit lateral movement opportunities. 4) Monitor network traffic and device logs for unusual commands or configuration changes indicative of exploitation attempts. 5) Where feasible, replace vulnerable devices with updated hardware or alternative products from vendors with active security support. 6) Employ network intrusion detection systems (NIDS) with signatures targeting known exploit patterns for this vulnerability. 7) Educate network administrators about the vulnerability and signs of compromise. 8) If remote management is necessary, enforce strong authentication and VPN access to reduce exposure. These targeted actions go beyond generic advice by focusing on device identification, access control, monitoring, and network architecture adjustments to mitigate risk until a vendor patch or device replacement is possible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-30T19:05:10.989Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cb6f5ce6bfc5ba1de4b850

Added to database: 3/31/2026, 6:53:16 AM

Last enriched: 3/31/2026, 7:08:36 AM

Last updated: 3/31/2026, 8:02:09 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses