CVE-2025-15471
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
A vulnerability was detected in TRENDnet TEW-713RE 1.02. The impacted element is an unknown function of the file /goformX/formFSrvX. The manipulation of the argument SZCMD results in os command injection. It is possible to launch the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Analysis
TRENDnet TEW-713RE WiFi range extender (v1.02) has OS command injection in /goformX/formFSrvX via the SZCMD parameter. Public exploit available, vendor unresponsive. The device likely will not receive a patch.
Technical Context
The formFSrvX handler passes the SZCMD parameter directly to a system command (CWE-77) without sanitization. The public exploit makes this trivially exploitable by anyone. The vendor was contacted but did not respond, suggesting the device may be abandoned.
Affected Products
TRENDnet TEW-713RE v1.02
Remediation
Replace this device immediately. TRENDnet has not responded to disclosure. Do not expose the management interface to any untrusted network.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today