CVE-2026-5351
Published: 02 April 2026
Description
Adversaries may abuse scripting or built-in command line interpreters (CLI) on network devices to execute malicious command and payloads.
Security Summary
CVE-2026-5351 is an OS command injection vulnerability in the Trendnet TEW-657BRM router running firmware version 1.00.1. The issue resides in the add_wps_client function within the /setup.cgi script, where manipulation of the wl_enrolee_pin argument enables arbitrary command execution. This flaw is classified under CWE-77 (Command Line Execution Improper Neutralization) and CWE-78 (OS Command Injection), with a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
The vulnerability can be exploited remotely by attackers who possess low privileges, such as authenticated users with access to the web interface. Successful exploitation allows limited impacts, including low-level disclosure of confidential information, modification of data, and denial of service through command injection. A public exploit is available, increasing the risk for affected devices still in use.
Vendor advisories indicate no patches or support are available, as the TEW-657BRM product reached end-of-life on June 23, 2011—over 14 years ago. Trendnet has stated they cannot confirm the vulnerability due to lack of support but plans to post an announcement on their product support page and notify registered customers. This issue exclusively affects unsupported, discontinued products.
Notable context includes the public availability of an exploit, which could facilitate attacks on legacy networks still deploying these routers. No evidence of widespread real-world exploitation is reported in the provided details.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
OS command injection via authenticated web interface on router enables exploitation of public-facing application (T1190) and network device CLI command execution (T1059.008).