Cyber Posture

CVE-2026-5353

MediumPublic PoC

Published: 02 April 2026

Published
02 April 2026
Modified
07 April 2026
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0038 59.4th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-5353 is a medium-severity Command Injection (CWE-77) vulnerability in Trendnet Tew-657Brm Firmware. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 40.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SA-22 (Unsupported System Components) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Prohibits the use of unsupported system components like this EOL router that cannot be patched for the OS command injection vulnerability.

prevent

Requires validation of inputs such as the c4_IPAddr argument to prevent OS command injection in the ping_test function.

prevent

Mandates identification and remediation of flaws like this command injection, leading to patching or retirement of the affected EOL product.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.008 Network Device CLI Execution
Adversaries may abuse scripting or built-in command line interpreters (CLI) on network devices to execute malicious command and payloads.
Why these techniques?

OS command injection via public-facing web CGI (/setup.cgi) on a network device (router) directly enables exploitation of public-facing applications (T1190) and execution of commands via Network Device CLI or Unix Shell (T1059.008).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A vulnerability was detected in Trendnet TEW-657BRM 1.00.1. Affected is the function ping_test of the file /setup.cgi. Performing a manipulation of the argument c4_IPAddr results in os command injection. Remote exploitation of the attack is possible. The exploit is now…

more

public and may be used. The vendor confirms, that "[t]he product in question (...) has been discontinued and end of life since June 23, 2011, that is more than 14 years ago. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on our website's product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer.

Deeper analysisAI

CVE-2026-5353 is an OS command injection vulnerability (CWE-77, CWE-78) in the ping_test function of the /setup.cgi file within Trendnet TEW-657BRM version 1.00.1. Manipulation of the c4_IPAddr argument allows attackers to inject arbitrary operating system commands, enabling remote exploitation.

Attackers with low privileges (PR:L), such as authenticated users, can exploit this vulnerability over the network (AV:N) with low complexity (AC:L) and no user interaction (UI:N). Successful exploitation results in limited impacts on confidentiality, integrity, and availability (C:L/I:L/A:L), with an overall CVSS v3.1 base score of 6.3. The exploit is publicly available.

The vendor has confirmed that the affected product was discontinued and reached end-of-life on June 23, 2011—over 14 years ago—and receives no support. As a result, no patches or fixes are provided, and the vendor cannot confirm the vulnerability details. They plan to post an announcement on their product support page and notify registered customers. This issue only affects unsupported products.

Notable context includes the public availability of the exploit, as documented in references such as the GitHub repository and VulDB entries, increasing risk for any remaining deployments of this legacy router.

Details

CWE(s)

Affected Products

trendnet
tew-657brm firmware
1.00.1

CVEs Like This One

CVE-2026-5355Same product: Trendnet Tew-657Brm
CVE-2026-5351Same product: Trendnet Tew-657Brm
CVE-2026-5352Same product: Trendnet Tew-657Brm
CVE-2026-5354Same product: Trendnet Tew-657Brm
CVE-2026-5350Same product: Trendnet Tew-657Brm
CVE-2026-5349Same product: Trendnet Tew-657Brm
CVE-2026-7609Same vendor: Trendnet
CVE-2025-15471Same vendor: Trendnet
CVE-2025-15472Same vendor: Trendnet
CVE-2025-15137Same vendor: Trendnet

References