Legacy Product: TEW-657BRM Wireless Modem Router Possible Vulnerabilities
TRENDnet has received report of possible vulnerabilities for TEW-657BRM Wireless Modem Router.
Stack-based overflow (CVE-2026-5349)
Stack-based overflow (CVE-2026-5350)
OS command injection (CVE-2026-5351)
OS command injection (CVE-2026-5352)
OS command injection (CVE-2026-5353)
OS command injection (CVE-2026-5354)
OS command injection (CVE-2026-5355)
The product has reached End of Life (EOL) and End of Support. TRENDnet can no longer provide updates or technical assistance for it. We strongly recommend that customers retire the product to protect any devices connected to them.
If you cannot replace the product immediately, please take thefollowing steps to reduce the risk of a cyberattack:
- Disable "Remote Management" in the device settings (Note: This should be disabled by default).
- Close the configuration page immediately after changing and saving settings. Do not browse other websites while the configuration page is open.
- Change your password periodically. Use a strong password (minimum 12 characters) including numbers, special characters, and both uppercase and lowercase letters.
- Update your Wi-Fi password regularly using a strong, unique passphrase.
- Restrict Wi-Fi access only to people you trust.
- Power off the device when it is not in use.
- Restart (power cycle) the device every few days to clear potential temporary exploits.
REVISION: 3-19-2026, initial release
