Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5351: OS Command Injection in Trendnet TEW-657BRM

0
Medium
VulnerabilityCVE-2026-5351cvecve-2026-5351
Published: Thu Apr 02 2026 (04/02/2026, 15:45:12 UTC)
Source: CVE Database V5
Vendor/Project: Trendnet
Product: TEW-657BRM

Description

CVE-2026-5351 is an OS command injection vulnerability in the Trendnet TEW-657BRM router firmware version 1. 00. 1, specifically in the add_wps_client function of /setup. cgi. The vulnerability arises from improper sanitization of the wl_enrolee_pin parameter, allowing remote attackers to execute arbitrary OS commands without authentication or user interaction. Although the exploit code is publicly available, the affected product has been discontinued and unsupported since 2011. The CVSS 4. 0 base score is 5. 3 (medium severity), reflecting moderate impact and ease of exploitation. No patches are available due to the product’s end-of-life status.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 16:23:38 UTC

Technical Analysis

The vulnerability CVE-2026-5351 affects the Trendnet TEW-657BRM wireless router running firmware version 1.00.1. It is an OS command injection flaw located in the add_wps_client function within the /setup.cgi endpoint. The issue stems from insufficient input validation of the wl_enrolee_pin parameter, which is used during the WPS client enrollment process. An attacker can remotely send crafted requests to this CGI script, injecting arbitrary operating system commands that the device executes with elevated privileges. The attack vector requires no authentication or user interaction, making it remotely exploitable over the network. The vendor has confirmed the product is discontinued and unsupported since June 2011, and no patches or updates are available. The vulnerability has a CVSS 4.0 score of 5.3, indicating medium severity due to the moderate impact on confidentiality, integrity, and availability, combined with ease of exploitation. Although no known exploits have been observed in the wild, public exploit code exists, increasing the risk of future attacks. The lack of vendor support means affected devices remain vulnerable indefinitely unless replaced or mitigated through network controls. This vulnerability highlights the risks associated with legacy IoT and networking equipment that remains operational beyond its support lifecycle.

Potential Impact

Organizations using the Trendnet TEW-657BRM router with vulnerable firmware face significant security risks. Successful exploitation allows remote attackers to execute arbitrary OS commands, potentially leading to full device compromise. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, disruption of network availability, and use of the device as a pivot point for further attacks. Since the device is often deployed in small office or home office environments, attackers could gain footholds into corporate networks if these devices are connected to enterprise infrastructure. The lack of vendor support and patches means vulnerabilities cannot be remediated through firmware updates, increasing the likelihood of exploitation over time. The public availability of exploit code lowers the barrier for attackers, including less skilled threat actors. Overall, the vulnerability poses a moderate to high operational risk, particularly in environments where legacy hardware is still in use and network segmentation is weak or absent.

Mitigation Recommendations

Given the device is discontinued and unsupported, the primary mitigation is to replace the Trendnet TEW-657BRM router with a modern, supported device that receives regular security updates. Until replacement is possible, organizations should isolate the vulnerable device on a separate network segment with strict firewall rules to limit inbound access to the /setup.cgi interface. Disable WPS functionality if configurable, as the vulnerability is tied to the WPS enrollment process. Monitor network traffic for unusual requests targeting the /setup.cgi endpoint or suspicious command injection patterns. Employ network intrusion detection systems (NIDS) with signatures for known exploit attempts. Educate users about the risks of legacy hardware and enforce asset management policies to identify and phase out unsupported devices. If replacement is delayed, consider deploying virtual patching via network security appliances to block exploitation attempts. Regularly review and update network segmentation and access controls to minimize exposure of vulnerable devices to untrusted networks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-04-01T16:47:08.739Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ce9471e6bfc5ba1de9346c

Added to database: 4/2/2026, 4:08:17 PM

Last enriched: 4/2/2026, 4:23:38 PM

Last updated: 4/2/2026, 6:48:49 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses