Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 02 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Trendnet tew-821dap
|
|
| Vendors & Products |
Trendnet tew-821dap
|
Sat, 02 May 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in TRENDnet TEW-821DAP 1.12B01. This affects an unknown function of the file /www/cgi/ssi of the component Firmware Update. Such manipulation leads to cleartext transmission of sensitive information. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is reported as difficult. The exploit has been disclosed to the public and may be used. The vendor explains: "That firmware version will only work on our hardware version v1.xR. We have already EOL that product 8 years ago and are no longer selling". This vulnerability only affects products that are no longer supported by the maintainer. | |
| Title | TRENDnet TEW-821DAP Firmware Update ssi cleartext transmission | |
| First Time appeared |
Trendnet
Trendnet tew-821dap Firmware |
|
| Weaknesses | CWE-310 CWE-319 |
|
| CPEs | cpe:2.3:o:trendnet:tew-821dap_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Trendnet
Trendnet tew-821dap Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-02T09:15:10.757Z
Reserved: 2026-05-01T12:07:37.870Z
Link: CVE-2026-7610
No data.
Status : Received
Published: 2026-05-02T10:16:19.460
Modified: 2026-05-02T10:16:19.460
Link: CVE-2026-7610
No data.
OpenCVE Enrichment
Updated: 2026-05-02T11:30:41Z