Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Trendnet tew-713re
|
|
| Vendors & Products |
Trendnet tew-713re
|
Tue, 31 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 31 Mar 2026 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in TRENDnet TEW-713RE up to 1.02. The impacted element is an unknown function of the file /goform/setSysAdm. The manipulation of the argument admuser leads to command injection. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | TRENDnet TEW-713RE setSysAdm command injection | |
| First Time appeared |
Trendnet
Trendnet tew-713re Firmware |
|
| Weaknesses | CWE-74 CWE-77 |
|
| CPEs | cpe:2.3:o:trendnet:tew-713re_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Trendnet
Trendnet tew-713re Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-31T13:46:36.074Z
Reserved: 2026-03-30T19:05:10.989Z
Link: CVE-2026-5184
Updated: 2026-03-31T13:46:31.247Z
Status : Awaiting Analysis
Published: 2026-03-31T07:16:12.437
Modified: 2026-04-01T14:24:02.583
Link: CVE-2026-5184
No data.
OpenCVE Enrichment
Updated: 2026-03-31T20:39:25Z