{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-7609","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-05-01T12:07:34.727Z","datePublished":"2026-05-02T09:00:18.863Z","dateUpdated":"2026-05-02T09:00:18.863Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-05-02T09:00:18.863Z"},"title":"TRENDnet TEW-821DAP Firmware Udpate diagnostic tools_diagnostic os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"OS Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]}],"affected":[{"vendor":"TRENDnet","product":"TEW-821DAP","versions":[{"version":"1.12B01","status":"affected"}],"cpes":["cpe:2.3:o:trendnet:tew-821dap_firmware:*:*:*:*:*:*:*:*"],"modules":["Firmware Udpate"]}],"descriptions":[{"lang":"en","value":"A flaw has been found in TRENDnet TEW-821DAP up to 1.12B01. The impacted element is the function tools_diagnostic of the file /tmp/diagnostic of the component Firmware Udpate. This manipulation causes os command injection. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor explains: \"That firmware version will only work on our hardware version v1.xR. We have already EOL that product 8 years ago and are no longer selling\". This vulnerability only affects products that are no longer supported by the maintainer."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-05-01T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-05-01T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-05-01T14:12:58.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"IOT_Res (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB CNA Team","type":"coordinator"}],"references":[{"url":"https://vuldb.com/vuln/360566","name":"VDB-360566 | TRENDnet TEW-821DAP Firmware Udpate diagnostic tools_diagnostic os command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/360566/cti","name":"VDB-360566 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/806216","name":"Submit #806216 | Trendnet TEW-821DAP v1.12B01  CWE-78 Improper Neutralization of Special Elements used in an O","tags":["third-party-advisory"]},{"url":"https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Trendnet/TEW-821DAP_CI2.md","tags":["exploit","patch"]}],"tags":["unsupported-when-assigned"]}}}