CVE-2026-5353
Received Received - Intake
OS Command Injection in Trendnet TEW-657BRM /setup.cgi Ping Test

Publication date: 2026-04-02

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was detected in Trendnet TEW-657BRM 1.00.1. Affected is the function ping_test of the file /setup.cgi. Performing a manipulation of the argument c4_IPAddr results in os command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor confirms, that "[t]he product in question (...) has been discontinued and end of life since June 23, 2011, that is more than 14 years ago. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on our website's product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-02
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
trendnet tew-657brm_firmware 1.00.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify how the CVE-2026-5353 vulnerability impacts compliance with common standards and regulations such as GDPR or HIPAA.


Can you explain this vulnerability to me?

CVE-2026-5353 is a remote OS command injection vulnerability in the Trendnet TEW-657BRM router, version 1.00.1. It exists in the ping_test function of the setup.cgi script, where the user-supplied parameter c4_IPAddr is passed directly to a system command without any input validation or sanitization.

This allows an attacker with valid admin credentials to remotely inject and execute arbitrary operating system commands by manipulating the c4_IPAddr parameter in an HTTP POST request.

A proof-of-concept exploit demonstrates this by executing commands such as listing directory contents and saving the output to a file on the device.


How can this vulnerability impact me? :

This vulnerability can allow an attacker with admin access to remotely execute arbitrary commands on the affected router, potentially leading to unauthorized control over the device.

Such control could be used to manipulate device settings, access sensitive network information, disrupt network operations, or use the device as a foothold for further attacks within the network.

Since the product is discontinued and no longer supported, patches or fixes are not available, increasing the risk if the device remains in use.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing the /setup.cgi endpoint on the Trendnet TEW-657BRM router, specifically targeting the ping_test function with the c4_IPAddr parameter.

A common detection method is to send a POST request with an injected command in the c4_IPAddr parameter and observe if the command executes on the device.

  • Use a command like: curl -X POST -u admin:admin 'http://<router-ip>/setup.cgi' -d 'action=ping_test&c4_IPAddr=; /bin/ls > /tmp/1.txt'
  • Check if the file 1.txt is created on the device or if the command output is accessible, indicating successful command injection.

What immediate steps should I take to mitigate this vulnerability?

Since the affected product Trendnet TEW-657BRM has been discontinued and is no longer supported since 2011, no official patches or updates are available.

Immediate mitigation steps include removing the vulnerable device from the network or isolating it to prevent remote access.

If removal is not possible, restrict access to the device's management interface by limiting IP addresses that can connect and enforcing strong authentication.

Monitor network traffic for suspicious POST requests to /setup.cgi with unusual c4_IPAddr parameters.

Consider replacing the device with a supported and updated model to eliminate the risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart