TRENDnet TEW-657BRM 1.00.1 has an authenticated remote OS command injection vulnerability in the setup.cgi binary, exploitable via the HTTP parameters "command", "todo", and "next_file," which allows an attacker to execute arbitrary commands with root privileges.
References
| Link | Resource |
|---|---|
| https://github.com/WhereisRain/TEW-657BRM | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
05 Dec 2025, 13:34
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:trendnet:tew-657brm_firmware:1.00.1:*:*:*:*:*:*:* cpe:2.3:h:trendnet:tew-657brm:-:*:*:*:*:*:*:* |
|
| First Time |
Trendnet
Trendnet tew-657brm Trendnet tew-657brm Firmware |
|
| References | () https://github.com/WhereisRain/TEW-657BRMĀ - Exploit, Third Party Advisory |
28 Nov 2025, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-78 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.0 |
26 Nov 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-26 21:15
Updated : 2025-12-05 13:34
NVD link : CVE-2025-65202
Mitre link : CVE-2025-65202
CVE.ORG link : CVE-2025-65202
JSON object : View
Products Affected
trendnet
- tew-657brm_firmware
- tew-657brm
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
