TRENDnet TEW-657BRM 1.00.1 has an authenticated remote OS command injection vulnerability in the setup.cgi binary, exploitable via the HTTP parameters "command", "todo", and "next_file," which allows an attacker to execute arbitrary commands with root privileges.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://github.com/WhereisRain/TEW-657BRM |
|
History
Fri, 05 Dec 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Trendnet tew-657brm Firmware
|
|
| CPEs | cpe:2.3:h:trendnet:tew-657brm:-:*:*:*:*:*:*:* cpe:2.3:o:trendnet:tew-657brm_firmware:1.00.1:*:*:*:*:*:*:* |
|
| Vendors & Products |
Trendnet tew-657brm Firmware
|
Fri, 28 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-78 | |
| Metrics |
cvssV3_1
|
Thu, 27 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Trendnet
Trendnet tew-657brm |
|
| Vendors & Products |
Trendnet
Trendnet tew-657brm |
Wed, 26 Nov 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TRENDnet TEW-657BRM 1.00.1 has an authenticated remote OS command injection vulnerability in the setup.cgi binary, exploitable via the HTTP parameters "command", "todo", and "next_file," which allows an attacker to execute arbitrary commands with root privileges. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-11-26T00:00:00.000Z
Updated: 2025-11-28T14:17:06.184Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65202
Updated: 2025-11-28T14:16:53.287Z
Status : Analyzed
Published: 2025-11-26T21:15:46.533
Modified: 2025-12-05T13:34:32.730
Link: CVE-2025-65202
No data.