CVE-2026-5350
Received Received - Intake
Remote Stack-Based Buffer Overflow in Trendnet TEW-657BRM Setup.cgi

Publication date: 2026-04-02

Last updated on: 2026-04-07

Assigner: VulDB

Description
A security flaw has been discovered in Trendnet TEW-657BRM 1.00.1. The impacted element is the function update_pcdb of the file /setup.cgi. The manipulation of the argument mac_pc_dba results in stack-based buffer overflow. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor confirms, that "[t]he product in question (...) has been discontinued and end of life since June 23, 2011, that is more than 14 years ago. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on our website's product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-02
Last Modified
2026-04-07
Generated
2026-05-06
AI Q&A
2026-04-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
trendnet tew-657brm_firmware 1.00.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-119 The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-5350 is a stack-based buffer overflow vulnerability in the Trendnet TEW-657BRM router, version 1.00.1. It occurs in the update_pcdb function of the /setup.cgi file, where the mac_pc_dba parameter from user input is copied without proper bounds checking. This allows an attacker to send a specially crafted HTTP POST request with an excessively long mac_pc_dba value, causing a stack overflow.

Because the vulnerability can be exploited remotely, an attacker can trigger this overflow over the network without needing local access.


How can this vulnerability impact me? :

Exploitation of this vulnerability can lead to serious security consequences such as remote code execution, denial of service, or system compromise on the affected device.

Since the vulnerability allows remote attackers to overflow the stack, it may enable them to execute arbitrary code or crash the device, disrupting network connectivity or gaining unauthorized control.

However, this vulnerability affects a discontinued product that has been end-of-life since 2011, and no official support or patches are available.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for suspicious HTTP POST requests to the /setup.cgi endpoint on the Trendnet TEW-657BRM router, specifically those containing the mac_pc_dba parameter with an unusually large payload.

A detection method involves inspecting network traffic for POST requests with a large Content-Length header targeting /setup.cgi and containing the mac_pc_dba parameter filled with repeated characters.

Example command using tcpdump to capture such traffic:

  • tcpdump -i <interface> -A 'tcp dst port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) > 8000)'

Alternatively, using tools like Wireshark or network intrusion detection systems (NIDS) to filter HTTP POST requests to /setup.cgi with large payloads containing mac_pc_dba can help identify exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include disabling remote access to the affected Trendnet TEW-657BRM router's management interface to prevent exploitation via remote HTTP POST requests.

Since the product is discontinued and no longer supported, applying vendor patches is not possible.

Consider replacing the affected device with a supported and updated router model to eliminate the vulnerability.

Additionally, monitoring network traffic for suspicious POST requests to /setup.cgi and blocking such traffic via firewall rules can reduce risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart