Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5355: OS Command Injection in Trendnet TEW-657BRM

0
Medium
VulnerabilityCVE-2026-5355cvecve-2026-5355
Published: Thu Apr 02 2026 (04/02/2026, 16:45:17 UTC)
Source: CVE Database V5
Vendor/Project: Trendnet
Product: TEW-657BRM

Description

A vulnerability has been found in Trendnet TEW-657BRM 1.00.1. Affected by this issue is the function vpn_drop of the file /setup.cgi. The manipulation of the argument policy_name leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor confirms, that "[t]he product in question (...) has been discontinued and end of life since June 23, 2011, that is more than 14 years ago. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on our website's product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 17:23:32 UTC

Technical Analysis

CVE-2026-5355 identifies a remote OS command injection vulnerability in the Trendnet TEW-657BRM router, specifically version 1.00.1. The vulnerability resides in the vpn_drop function of the /setup.cgi script, where the policy_name parameter is improperly sanitized, allowing an attacker to inject arbitrary operating system commands. This injection occurs without requiring authentication or user interaction, making it remotely exploitable over the network. The vendor has confirmed that the TEW-657BRM product line was discontinued and reached end-of-life status in June 2011, over 14 years ago, and no patches or support are available. The CVSS 4.0 base score is 5.3, reflecting medium severity due to the ease of exploitation (network vector, low attack complexity, no privileges or user interaction needed) but limited impact scope (low confidentiality, integrity, and availability impact). Although no known exploits are currently active in the wild, the public disclosure of the vulnerability increases the likelihood of future exploitation attempts. The vulnerability could allow attackers to execute arbitrary commands on the device, potentially leading to device compromise, network pivoting, or disruption of VPN functionality. Due to the product's age and lack of vendor support, affected devices remain vulnerable unless mitigated by network controls or device replacement.

Potential Impact

The primary impact of CVE-2026-5355 is the potential for remote attackers to execute arbitrary OS commands on the affected Trendnet TEW-657BRM routers. This can lead to full device compromise, allowing attackers to manipulate VPN configurations, intercept or redirect network traffic, or disrupt network availability. Confidentiality may be compromised if attackers gain access to sensitive VPN policies or network data. Integrity is at risk as attackers could alter device settings or inject malicious payloads. Availability could be affected if attackers disrupt VPN services or cause device crashes. Given the device is a network router with VPN capabilities, exploitation could facilitate lateral movement within an organization's network, increasing the risk of broader compromise. However, the impact is somewhat limited by the device's discontinued status and presumably low deployment in modern environments. Organizations still using this device in critical infrastructure or legacy systems face significant operational and security risks.

Mitigation Recommendations

Since the vendor no longer supports the TEW-657BRM and no patches are available, organizations should prioritize the following mitigations: 1) Immediately identify and inventory any deployed TEW-657BRM devices within the network. 2) Replace affected devices with currently supported and patched hardware to eliminate the vulnerability. 3) If immediate replacement is not feasible, isolate the device on a segmented network with strict access controls to limit exposure to untrusted networks. 4) Disable remote management interfaces and VPN functionalities if not in use to reduce attack surface. 5) Monitor network traffic for unusual activity or command injection attempts targeting the /setup.cgi endpoint. 6) Employ network intrusion detection/prevention systems (IDS/IPS) with signatures for command injection patterns. 7) Educate network administrators about the risks of using unsupported legacy devices and enforce policies to phase them out. These steps go beyond generic advice by focusing on compensating controls and device lifecycle management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-04-01T16:47:21.513Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cea282e6bfc5ba1ded3a66

Added to database: 4/2/2026, 5:08:18 PM

Last enriched: 4/2/2026, 5:23:32 PM

Last updated: 4/3/2026, 1:57:53 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses