A vulnerability was detected in TRENDnet TEW-713RE 1.02. The impacted element is an unknown function of the file /goformX/formFSrvX. The manipulation of the argument SZCMD results in os command injection. It is possible to launch the attack remotely. The exploit is now public and may be used. The vendor confirms: "The product in question TEW-731RE for CVE-2025-15471 has been discontinued and end of life since October 23, 2020. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on the website product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer.
References
| Link | Resource |
|---|---|
| https://pentagonal-time-3a7.notion.site/Command-Injection-Vulnerability-in-formFSrvX-of-Trendnet-TEW-713RE-2d1e5dd4c5a5801481abe7a944763d39 | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.339721 | Permissions Required VDB Entry |
| https://vuldb.com/?id.339721 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.721441 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
18 Mar 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) A vulnerability was detected in TRENDnet TEW-713RE 1.02. The impacted element is an unknown function of the file /goformX/formFSrvX. The manipulation of the argument SZCMD results in os command injection. It is possible to launch the attack remotely. The exploit is now public and may be used. The vendor confirms: "The product in question TEW-731RE for CVE-2025-15471 has been discontinued and end of life since October 23, 2020. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on the website product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer. |
20 Feb 2026, 20:20
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Trendnet
Trendnet tew-713re Trendnet tew-713re Firmware |
|
| CPE | cpe:2.3:h:trendnet:tew-713re:-:*:*:*:*:*:*:* cpe:2.3:o:trendnet:tew-713re_firmware:1.0.2:*:*:*:*:*:*:* |
|
| References | () https://pentagonal-time-3a7.notion.site/Command-Injection-Vulnerability-in-formFSrvX-of-Trendnet-TEW-713RE-2d1e5dd4c5a5801481abe7a944763d39 - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.339721 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.339721 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.721441 - Third Party Advisory, VDB Entry |
07 Jan 2026, 02:03
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-07 02:03
Updated : 2026-03-18 15:16
NVD link : CVE-2025-15471
Mitre link : CVE-2025-15471
CVE.ORG link : CVE-2025-15471
JSON object : View
Products Affected
trendnet
- tew-713re
- tew-713re_firmware
