CVE-2026-5355: OS Command Injection in Trendnet TEW-657BRM
A vulnerability has been found in Trendnet TEW-657BRM 1.00.1. Affected by this issue is the function vpn_drop of the file /setup.cgi. The manipulation of the argument policy_name leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor confirms, that "[t]he product in question (...) has been discontinued and end of life since June 23, 2011, that is more than 14 years ago. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on our website's product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer.
AI Analysis
Technical Summary
CVE-2026-5355 identifies a remote OS command injection vulnerability in the Trendnet TEW-657BRM router, specifically version 1.00.1. The vulnerability resides in the vpn_drop function of the /setup.cgi script, where the policy_name parameter is improperly sanitized, allowing an attacker to inject arbitrary operating system commands. This injection occurs without requiring authentication or user interaction, making it remotely exploitable over the network. The vendor has confirmed that the TEW-657BRM product line was discontinued and reached end-of-life status in June 2011, over 14 years ago, and no patches or support are available. The CVSS 4.0 base score is 5.3, reflecting medium severity due to the ease of exploitation (network vector, low attack complexity, no privileges or user interaction needed) but limited impact scope (low confidentiality, integrity, and availability impact). Although no known exploits are currently active in the wild, the public disclosure of the vulnerability increases the likelihood of future exploitation attempts. The vulnerability could allow attackers to execute arbitrary commands on the device, potentially leading to device compromise, network pivoting, or disruption of VPN functionality. Due to the product's age and lack of vendor support, affected devices remain vulnerable unless mitigated by network controls or device replacement.
Potential Impact
The primary impact of CVE-2026-5355 is the potential for remote attackers to execute arbitrary OS commands on the affected Trendnet TEW-657BRM routers. This can lead to full device compromise, allowing attackers to manipulate VPN configurations, intercept or redirect network traffic, or disrupt network availability. Confidentiality may be compromised if attackers gain access to sensitive VPN policies or network data. Integrity is at risk as attackers could alter device settings or inject malicious payloads. Availability could be affected if attackers disrupt VPN services or cause device crashes. Given the device is a network router with VPN capabilities, exploitation could facilitate lateral movement within an organization's network, increasing the risk of broader compromise. However, the impact is somewhat limited by the device's discontinued status and presumably low deployment in modern environments. Organizations still using this device in critical infrastructure or legacy systems face significant operational and security risks.
Mitigation Recommendations
Since the vendor no longer supports the TEW-657BRM and no patches are available, organizations should prioritize the following mitigations: 1) Immediately identify and inventory any deployed TEW-657BRM devices within the network. 2) Replace affected devices with currently supported and patched hardware to eliminate the vulnerability. 3) If immediate replacement is not feasible, isolate the device on a segmented network with strict access controls to limit exposure to untrusted networks. 4) Disable remote management interfaces and VPN functionalities if not in use to reduce attack surface. 5) Monitor network traffic for unusual activity or command injection attempts targeting the /setup.cgi endpoint. 6) Employ network intrusion detection/prevention systems (IDS/IPS) with signatures for command injection patterns. 7) Educate network administrators about the risks of using unsupported legacy devices and enforce policies to phase them out. These steps go beyond generic advice by focusing on compensating controls and device lifecycle management.
Affected Countries
United States, Canada, Germany, United Kingdom, Japan, Australia, France, Netherlands, South Korea, Brazil
CVE-2026-5355: OS Command Injection in Trendnet TEW-657BRM
Description
A vulnerability has been found in Trendnet TEW-657BRM 1.00.1. Affected by this issue is the function vpn_drop of the file /setup.cgi. The manipulation of the argument policy_name leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor confirms, that "[t]he product in question (...) has been discontinued and end of life since June 23, 2011, that is more than 14 years ago. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on our website's product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-5355 identifies a remote OS command injection vulnerability in the Trendnet TEW-657BRM router, specifically version 1.00.1. The vulnerability resides in the vpn_drop function of the /setup.cgi script, where the policy_name parameter is improperly sanitized, allowing an attacker to inject arbitrary operating system commands. This injection occurs without requiring authentication or user interaction, making it remotely exploitable over the network. The vendor has confirmed that the TEW-657BRM product line was discontinued and reached end-of-life status in June 2011, over 14 years ago, and no patches or support are available. The CVSS 4.0 base score is 5.3, reflecting medium severity due to the ease of exploitation (network vector, low attack complexity, no privileges or user interaction needed) but limited impact scope (low confidentiality, integrity, and availability impact). Although no known exploits are currently active in the wild, the public disclosure of the vulnerability increases the likelihood of future exploitation attempts. The vulnerability could allow attackers to execute arbitrary commands on the device, potentially leading to device compromise, network pivoting, or disruption of VPN functionality. Due to the product's age and lack of vendor support, affected devices remain vulnerable unless mitigated by network controls or device replacement.
Potential Impact
The primary impact of CVE-2026-5355 is the potential for remote attackers to execute arbitrary OS commands on the affected Trendnet TEW-657BRM routers. This can lead to full device compromise, allowing attackers to manipulate VPN configurations, intercept or redirect network traffic, or disrupt network availability. Confidentiality may be compromised if attackers gain access to sensitive VPN policies or network data. Integrity is at risk as attackers could alter device settings or inject malicious payloads. Availability could be affected if attackers disrupt VPN services or cause device crashes. Given the device is a network router with VPN capabilities, exploitation could facilitate lateral movement within an organization's network, increasing the risk of broader compromise. However, the impact is somewhat limited by the device's discontinued status and presumably low deployment in modern environments. Organizations still using this device in critical infrastructure or legacy systems face significant operational and security risks.
Mitigation Recommendations
Since the vendor no longer supports the TEW-657BRM and no patches are available, organizations should prioritize the following mitigations: 1) Immediately identify and inventory any deployed TEW-657BRM devices within the network. 2) Replace affected devices with currently supported and patched hardware to eliminate the vulnerability. 3) If immediate replacement is not feasible, isolate the device on a segmented network with strict access controls to limit exposure to untrusted networks. 4) Disable remote management interfaces and VPN functionalities if not in use to reduce attack surface. 5) Monitor network traffic for unusual activity or command injection attempts targeting the /setup.cgi endpoint. 6) Employ network intrusion detection/prevention systems (IDS/IPS) with signatures for command injection patterns. 7) Educate network administrators about the risks of using unsupported legacy devices and enforce policies to phase them out. These steps go beyond generic advice by focusing on compensating controls and device lifecycle management.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-04-01T16:47:21.513Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69cea282e6bfc5ba1ded3a66
Added to database: 4/2/2026, 5:08:18 PM
Last enriched: 4/2/2026, 5:23:32 PM
Last updated: 4/3/2026, 1:57:53 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.