OS Command Injection in Trendnet TEW-657BRM Router
CVE-2026-5351
Key Information:
- Vendor
Trendnet
- Status
- Vendor
- CVE Published:
- 2 April 2026
Badges
What is CVE-2026-5351?
A vulnerability exists in the Trendnet TEW-657BRM router due to improper handling of the wl_enrolee_pin argument in the add_wps_client function within the setup.cgi file. This weakness allows for OS command injection, potentially enabling remote attackers to execute arbitrary commands on the device. The impacted product has been discontinued since June 23, 2011, which means that it is no longer supported by the vendor, Trendnet. As a result, they cannot provide fixes or confirm the vulnerability, leaving users of the outdated firmware at risk.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
TEW-657BRM 1.00.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
