CVE-2026-7610
LOWTRENDnet TEW-821DAP Firmware Update ssi cleartext transmission
Title source: cnaDescription
A vulnerability has been found in TRENDnet TEW-821DAP 1.12B01. This affects an unknown function of the file /www/cgi/ssi of the component Firmware Update. Such manipulation leads to cleartext transmission of sensitive information. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is reported as difficult. The exploit has been disclosed to the public and may be used. The vendor explains: "That firmware version will only work on our hardware version v1.xR. We have already EOL that product 8 years ago and are no longer selling". This vulnerability only affects products that are no longer supported by the maintainer.
References (4)
Core 4
Core References
Vdb Entry vdb-entry
VDB-360567 | TRENDnet TEW-821DAP Firmware Update ssi cleartext transmission
https://vuldb.com/vuln/360567
Signature, Permissions Required signature
permissions-required
VDB-360567 | CTI Indicators (IOB, IOC, TTP, IOA)
https://vuldb.com/vuln/360567/cti
Third Party Advisory third-party-advisory
Submit #806217 | Trendnet TEW-821DAP v1.12B01 CWE-319: Cleartext Transmission of Sensitive Information
https://vuldb.com/submit/806217
Scores
CVSS v3
3.7
EPSS
0.0001
EPSS Percentile
2.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-310
CWE-319
Status
published
Products (2)
TRENDnet/TEW-821DAP
1.12B01
trendnet/tew-821dap_firmware
1.12b01
Published
May 02, 2026
Tracked Since
May 02, 2026