Back to VulnFeed / CVE-2026-7610
root@hackertop:~/vulnfeed/CVE-2026-7610#
CVE-2026-7610 LOW CVE ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

TRENDnet TEW-821DAP 1.12B01 Firmware Update /www/cgi/ssi cleartext transmission

TEW-821DAP 20d ago Impact pending confirmation
LIFECYCLE
3.4 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability classified as problematic has been found in TRENDnet TEW-821DAP 1.12B01. This affects an unknown code of the file /www/cgi/ssi of the component Firmware Update. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Root Cause Analysis
CWE is classifying the issue as CWE-319. The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.

Impact: This is going to have an impact on confidentiality.

Exploit: It is declared as proof-of-concept. The vendor explains: "That firmware version will only work on our hardware version v1.xR. We have already EOL that product 8 years ago and are no longer selling".

Countermeasure: There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-7610 · CVSS 3.4 · Active Threat