CVE-2026-5351
Received Received - Intake
Remote OS Command Injection in Trendnet TEW-657BRM WPS Setup

Publication date: 2026-04-02

Last updated on: 2026-04-29

Assigner: VulDB

Description
A weakness has been identified in Trendnet TEW-657BRM 1.00.1. This affects the function add_wps_client of the file /setup.cgi. This manipulation of the argument wl_enrolee_pin causes os command injection. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor confirms, that "[t]he product in question (...) has been discontinued and end of life since June 23, 2011, that is more than 14 years ago. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on our website's product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-02
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
trendnet tew-657brm_firmware 1.00.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-5351 is a remote OS command injection vulnerability in the Trendnet TEW-657BRM router, version 1.00.1. It exists in the add_wps_client function of the setup.cgi script, where the parameter wl_enrolee_pin is taken from user input and passed directly to the system command without validation or sanitization.

This allows an attacker to remotely inject arbitrary operating system commands by manipulating the wl_enrolee_pin parameter, potentially executing any command on the device.

The exploit can be performed via a POST request to /setup.cgi with the malicious wl_enrolee_pin value, and although basic authentication is required, the attack can still be initiated remotely.


How can this vulnerability impact me? :

This vulnerability allows an attacker to execute arbitrary commands on the affected router remotely, which can lead to unauthorized control over the device.

Potential impacts include disruption of network services, unauthorized access to network traffic, installation of malicious software, or using the device as a foothold for further attacks within the network.

Since the product is discontinued and no longer supported, no patches or fixes are available, increasing the risk if the device is still in use.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by sending a crafted POST request to the /setup.cgi endpoint on the Trendnet TEW-657BRM router, targeting the add_wps_client function with a manipulated wl_enrolee_pin parameter.

For example, a test command could inject shell commands via the wl_enrolee_pin parameter to check for command execution. A proof of concept uses a payload like '; /bin/ls>/5.txt' to execute the ls command and write the output to a file named 5.txt on the device.

This requires basic authentication on the device and can be done remotely.

  • Use a curl command to send a POST request with the malicious wl_enrolee_pin parameter, for example: curl -u <username>:<password> -X POST -d 'wl_enrolee_pin=; /bin/ls>/5.txt' http://<router-ip>/setup.cgi
  • Check the device filesystem for the presence of the 5.txt file to confirm command execution.

What immediate steps should I take to mitigate this vulnerability?

Since the affected product, Trendnet TEW-657BRM version 1.00.1, has been discontinued and is no longer supported since June 23, 2011, no official patches or updates are available.

Immediate mitigation steps include removing the vulnerable device from the network or isolating it to prevent remote access.

Restrict access to the device's management interface, especially blocking remote access to the /setup.cgi endpoint.

Consider replacing the device with a supported and updated router model to ensure security.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart