๐Ÿ” CVE Alert

CVE-2026-5184

MEDIUM 6.3

TRENDnet TEW-713RE setSysAdm command injection

CVSS Score
6.3
EPSS Score
0.8%
EPSS Percentile
75th

A vulnerability was identified in TRENDnet TEW-713RE up to 1.02. The impacted element is an unknown function of the file /goform/setSysAdm. The manipulation of the argument admuser leads to command injection. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

CWE CWE-77 CWE-74
Vendor trendnet
Product tew-713re
Published Mar 31, 2026
Last Updated Mar 31, 2026
Stay Ahead of the Next One

Get instant alerts for trendnet tew-713re

Be the first to know when new medium vulnerabilities affecting trendnet tew-713re are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

TRENDnet / TEW-713RE
1.02

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/354252 vuldb.com: https://vuldb.com/vuln/354252/cti vuldb.com: https://vuldb.com/submit/780389 github.com: https://github.com/panda666-888/vuls/blob/main/trendnet/tew-713re/setSysAdm.md

Credits

๐Ÿ” panda_0x1 (VulDB User) VulDB