Cyber Posture

CVE-2026-5352

MediumPublic PoC

Published: 02 April 2026

Published
02 April 2026
Modified
07 April 2026
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0038 59.4th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-5352 is a medium-severity Command Injection (CWE-77) vulnerability in Trendnet Tew-657Brm Firmware. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 40.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SA-22 (Unsupported System Components) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires replacement, prohibition, or compensating controls for unsupported EOL products like the Trendnet TEW-657BRM with no patches available.

prevent

Mandates validation of inputs like the pcdb_list argument to prevent OS command injection in the /setup.cgi Edit function.

prevent

Requires identification, reporting, and correction of flaws such as this command injection vulnerability classified under CWE-77/78.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

OS command injection in web CGI (/setup.cgi) enables exploitation of public-facing application (T1190) and arbitrary Unix shell command execution (T1059.004) on the router's OS.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A security vulnerability has been detected in Trendnet TEW-657BRM 1.00.1. This impacts the function Edit of the file /setup.cgi. Such manipulation of the argument pcdb_list leads to os command injection. The attack may be launched remotely. The exploit has been…

more

disclosed publicly and may be used. The vendor confirms, that "[t]he product in question (...) has been discontinued and end of life since June 23, 2011, that is more than 14 years ago. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on our website's product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer.

Deeper analysisAI

CVE-2026-5352 is an OS command injection vulnerability in Trendnet TEW-657BRM version 1.00.1, affecting the Edit function within the /setup.cgi file. The flaw arises from improper handling of the pcdb_list argument, allowing malicious input to execute arbitrary operating system commands. It is classified under CWE-77 (Command Injection) and CWE-78 (OS Command Injection), with a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).

The vulnerability can be exploited remotely by an attacker with low privileges, such as a user authenticated to the device. Exploitation requires network access and low attack complexity but no user interaction. Successful injection enables limited impacts on confidentiality, integrity, and availability, potentially allowing command execution within the context of the web server process.

Vendor advisories indicate no patches or support are available, as the TEW-657BRM product reached end-of-life on June 23, 2011, over 14 years ago. Trendnet states it cannot confirm the vulnerability due to lack of support but plans to announce details on its product support page and notify registered customers. The issue exclusively affects unsupported devices.

An exploit has been publicly disclosed, as documented in references including a GitHub proof-of-concept and VulDB entries. No evidence of active real-world exploitation is noted beyond this disclosure.

Details

CWE(s)

Affected Products

trendnet
tew-657brm firmware
1.00.1

CVEs Like This One

CVE-2026-5354Same product: Trendnet Tew-657Brm
CVE-2026-5355Same product: Trendnet Tew-657Brm
CVE-2026-5351Same product: Trendnet Tew-657Brm
CVE-2026-5353Same product: Trendnet Tew-657Brm
CVE-2026-5349Same product: Trendnet Tew-657Brm
CVE-2026-5350Same product: Trendnet Tew-657Brm
CVE-2026-7609Same vendor: Trendnet
CVE-2025-15471Same vendor: Trendnet
CVE-2025-15472Same vendor: Trendnet
CVE-2024-57590Same vendor: Trendnet

References