Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 02 May 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Trendnet tew-821dap
|
|
| Vendors & Products |
Trendnet tew-821dap
|
Sat, 02 May 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in TRENDnet TEW-821DAP up to 1.12B01. This impacts the function platform_do_upgrade_cameo_dev of the file cameo_dev.sh of the component Firmware Update Handler. Performing a manipulation results in insufficient verification of data authenticity. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is said to be difficult. The vendor explains: "That firmware version will only work on our hardware version v1.xR. We have already EOL that product 8 years ago and are no longer selling". This vulnerability only affects products that are no longer supported by the maintainer. | |
| Title | TRENDnet TEW-821DAP Firmware Update cameo_dev.sh platform_do_upgrade_cameo_dev data authenticity | |
| First Time appeared |
Trendnet
Trendnet tew-821dap Firmware |
|
| Weaknesses | CWE-345 | |
| CPEs | cpe:2.3:o:trendnet:tew-821dap_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Trendnet
Trendnet tew-821dap Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-02T09:30:12.219Z
Reserved: 2026-05-01T12:07:42.405Z
Link: CVE-2026-7611
No data.
Status : Received
Published: 2026-05-02T10:16:19.640
Modified: 2026-05-02T10:16:19.640
Link: CVE-2026-7611
No data.
OpenCVE Enrichment
Updated: 2026-05-02T11:30:41Z