CVE-2026-5350
Published: 02 April 2026
Description
A security flaw has been discovered in Trendnet TEW-657BRM 1.00.1. The impacted element is the function update_pcdb of the file /setup.cgi. The manipulation of the argument mac_pc_dba results in stack-based buffer overflow. The attack can be launched remotely. The exploit…
more
has been released to the public and may be used for attacks. The vendor confirms, that "[t]he product in question (...) has been discontinued and end of life since June 23, 2011, that is more than 14 years ago. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on our website's product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer.
Mitigating Controls (NIST 800-53 r5)AI
Directly prohibits the use of unsupported system components like this EOL router with no patches available.
Requires identification and remediation of flaws, necessitating removal or replacement of unpatchable EOL systems vulnerable to this buffer overflow.
Vulnerability scanning detects deployments of this EOL router firmware affected by the stack-based buffer overflow.
Security SummaryAI
CVE-2026-5350 is a stack-based buffer overflow vulnerability (CWE-119, CWE-121) affecting the Trendnet TEW-657BRM router on firmware version 1.00.1. The flaw resides in the update_pcdb function within the /setup.cgi file, where manipulation of the mac_pc_dba argument triggers the overflow.
The vulnerability enables remote exploitation by an attacker possessing low privileges, such as an authenticated user, with low attack complexity and no requirement for user interaction. Successful exploitation grants high confidentiality, integrity, and availability impacts (CVSS v3.1 base score of 8.8: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), potentially allowing arbitrary code execution. A public exploit has been released and may be used for attacks.
Vendor advisories indicate no patches or support are available, as the TEW-657BRM reached end-of-life on June 23, 2011, over 14 years ago. The vendor cannot confirm the vulnerabilities due to lack of support but plans to announce details on their website's product support page and notify registered customers. The issue affects only discontinued, unsupported products.
Notable context includes the public availability of an exploit, increasing risk for any remaining deployments of this obsolete router.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The stack-based buffer overflow in the router's public web CGI interface (/setup.cgi) enables remote authenticated attackers to achieve arbitrary code execution on an internet-facing application.