Back to VulnFeed / CVE-2026-7609
root@hackertop:~/vulnfeed/CVE-2026-7609#
CVE-2026-7609 MEDIUM Command Injection ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

TRENDnet TEW-821DAP up to 1.12B01 Firmware Udpate /tmp/diagnostic tools_diagnostic os command injection

TEW-821DAP 20d ago Impact pending confirmation
LIFECYCLE
5.7 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability was found in TRENDnet TEW-821DAP up to 1.12B01. It has been rated as critical. Affected by this issue is the function tools_diagnostic of the file /tmp/diagnostic of the component Firmware Udpate. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Root Cause Analysis
Using CWE to declare the problem leads to CWE-78. The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

Impact: Impacted is confidentiality, integrity, and availability.

Exploit: The exploit is available at github.com. It is declared as proof-of-concept. The vendor explains: "That firmware version will only work on our hardware version v1.xR. We have already EOL that product 8 years ago and are no longer selling".

Countermeasure: There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-7609 · CVSS 5.7 · Active Threat