skip to main content

Téléchargements produit


Trouvez des réponses, téléchargez des firmware/ pilotes et des documents. Comment trouver le numéro de série.

Annonces récentes

  • TEW-820AP Wireless AC Upgrader Possible stack overflow vulnerability
    11/14/2024
  • TRENDnet has received report of a possible stack overflow vulnerability involving TEW-820AP Wireless AC Upgrader that could allow a malicious cyber attacker to make the product unusable or gain access to its operating system; however, this product has reached its End of Life (EOL) and End of Support, and TRENDnet is unable to verify the vulnerability or provide additional support. TRENDnet recommends customer to retire the product to prevent risk of devices possibly connected to it.
  • TEW-752DRU WIRELESS ROUTER POSSIBLE BUFFER OVERFLOW VULNERABILITY
    8/26/2024
  • TRENDnet is aware of a possible buffer overflow vulnerability involving TEW-752DRU Wireless router that could allow a malicious cyber attacker to make the router unusable or gain access to its operating system; however, this product has reached its End of Life (EOL) and End of Support, and TRENDnet is unable to verify the vulnerability or provide additional support. TRENDnet recommends customer to retire the product to prevent risk of devices possibly connected to it.
  • TEW-829DRU WIRELESS ROUTER COMMAND INJECTION VULNERABILITY
    7/2/2024
  • TRENDnet has received report of a command injection vulnerability when the RADIUS authentication is enabled with TEW-829DRU hardware version v1.xR, firmware 1.0.3.9 and earlier. When exploited successfully, the attacker can have root access to the device. TRENDnet has released firmware update to address the vulnerability.
  • TV-IP422W WIRELESS NETWORK CAMERA REMOTE CODE EXECUTION VULNERABILITY
    6/18/2024
  • TRENDnet is aware of a possible Remote Code Execution (RCE) vulnerability involving TV-IP422W Wireless Network Camera that could allow a malicious cyber attacker to take over the camera and gain access to its operating system; however, this product has reached its End of Life (EOL) and End of Support, and TRENDnet is unable to verify the vulnerability or provide additional support. TRENDnet recommends customer to retire the product to prevent risk of devices possibly connected to it.
  • TEW-827DRU WIRELESS ROUTER COMMAND INJECTION VULNERABILITIES
    4/2/2024
  • TRENDnet has received report of the command injection vulnerability and known vulnerabilities in the cgi interface with TEW-827DRU hardware version 2.xR Firmware 2.10.B01 and earlier. When exploited successfully, the attacker can have root access to the device. TRENDnet has released firmware update to address these vulnerabilities, please click on the link below to go to the product's download page. Or, you can login to the device's management (http://TEW-827DRU) and click on the new firmware available notification on the upper right hand side to perform the firmware upgrade.

  • INDOOR WIRELESS ACCESS POINTS BUFFER OVERFLOW AND COMMAND INJECTION VULNERABILITIES
    1/11/2024
  • TRENDnet is aware of the buffer overflow and command injection vulnerabilities involving the TEW-821DAP Version 2.0R AC1200 Wireless Access Point that could allow a malicious cyber attacker to take over the device and gain access to its operating system.

    TEW-821DAP hardware version V2.xR, firmware version 3.01B02 and earlier
    TEW-825DAP hardware version v1.xR, firmware version 2.02B01 and earlier
    TEW-826DAP hardware version v1.xR, firmware version 2.00B08 and earlier
    TEW-921DAP hardware version v1.xR, firmware version 2.13B02 and earlier

  • TEW-820AP WIRELESS AC EASY-UPGRADER BUFFER OVERFLOW VULNERABILITIES
    11/2/2022
  • TRENDnet is aware of the possible buffer overflow vulnerabilities involving the TEW-820AP Wireless AC Easy-Upgrader that could allow a malicious cyber attacker to take over the device and gain access to its operating system; however, this product has reached its End of Life (EoL) and End of Support, and TRENDnet is unable to provide support to verify or resolve these vulnerabilities.

    TRENDnet recommends customers to retire this product to prevent the risk of devices possibly connecting to it.

  • FRAGMENT and FORGE VULNERABILITIES (FRAGATTACKS) AGAINST SOME WI-FI DEVICES
    8/17/2021
  • TRENDnet is aware of a series of published vulnerabilities known as FragAttacks in IEEE 802.11 standard Wi-Fi devices. The affected products are mainly wireless Access Points and Wireless Routers. To exploit these vulnerabilities, the attacker would need to connect to your Wi-Fi network. When exploited successfully, the attacker can extract data from the network, which can lead to additional exploits of your other network devices.

    TRENDnet has released firmware updates to address these vulnerabilities for the following products, please click on the link to go to the corresponding product’s download page.
  • TEW-714TRU TRAVEL ROUTER AUTHENTICATION BYPASS, HARD-CODED CREDENTIALS, AND UNRESTRICTED FILE WRITE VULNERABILITIES
    8/17/2021
  • TRENDnet is aware of the vulnerabilities involving the TEW-714TRU Wireless Travel Router that could allow a malicious cyber attacker to take over the router and gain access to its operating system; however, this product has reached its End of Life (EoL) and End of Support, and TRENDnet is unable to provide support to resolve these vulnerabilities.

    TRENDnet recommends customers to retire this product to prevent the risk of devices possibly connecting to it.
  • TRENDnet CloudView Service End of Life Announcement
    9/3/2020
  • September 3, 2020 - TRENDnet CloudView service will be discontinued on December 31, 2020. The cameras running the app and service reached the end of their service life a few years ago, therefore we have decided to discontinue the cloud service for these cameras on December 31, 2020. For more information, please visit www.trendnet.com/camera.
  • Safari Version 12 Camera Web-View Compatibility
    9/20/2018
  • Sept 20, 2018 - Safari version 12 was released Monday for MacOS Sierra and High Sierra users. Version 12 adds new restrictions on browser plugins developers which disables the web-view plugins for the cameras. If users are experiencing problems using Safari with their cameras, we recommend using the Chrome browser for Mac or our free mobile phone app to view the camera.
  • TU3-DS2 macOS 10.13.4 Compatibility
    6/12/2018
  • June 12, 2018 – Installing macOS 10.13.4 will cause any connected displays to go blank after the OS update when using the latest driver. Extended or mirror displays continue to work as expected in macOS 10.13.3, and we can only recommend that you stay on macOS 10.13.3 or earlier if you require this feature and have not already updated. Functionality such as Ethernet and audio are unaffected. We are working on a fix and updates will be posted on product download pages once available.
  • TEW-816DRM & TV-IP344PI ANNOUNCEMENT
    11/20/2017
  • TRENDnet was recently contacted by a firm with claims of vulnerabilities on the TV-IP344PI and the TEW-816DRM. Updates will be posted on TRENDnet website, and e-mails will be sent to those that registered their products.
  • WPA2 Security KRACK Attack Notice
    10/17/2017
  • A WPA2 vulnerability from the KRACK Attack was revealed on Oct. 16, 2017. This attack affects the entire wireless industry, but affected devices can be patched with a security update. TRENDnet is currently investigating the issue and we are working with our semiconductor chipset partners on patches. Updates will be posted on product download pages once available.
    Note:
    The WPA2 KRACK main attack targets client devices against the 4-way handshake, and requires physical proximity. Wi-Fi routers and wireless access points are not affected by this attack. However, to reduce the risk of attacks against your router or access points, disable client functionality and fast roaming (802.11r). For home users, be sure to keep client devices, such as laptops and smartphones, updated.
  • Critical Firmware Update for Some Network Cameras
    10/2/2017
  • Some network cameras could be compromised to security vulnerabilities described in ICSA-17-124-01 (Improper Authentication, Password in Configuration), where remote attackers could potentially gain partial access to some administrator pages in the device configuration without the proper credentials, and obtain the administrator password to your device configuration. We strongly recommend that owners of all affected cameras (see list below) with hardware version v1.0R to upgrade to the latest firmware version.
  • WiFi Baby Cam and Network Camera Security Advisory
    9/3/2015
  • Rapid7, a company that specializes in IT security, released a vulnerability report on video baby monitors, which included TRENDnet’s WiFi Baby Cam, model TV-IP743SIC. The report claims that the WiFi Baby Cam has a fixed user name and password that could be accessed via a direct UART serial connection to the WiFi Baby Cam.
  • TRENDnet Windows® 10 Product Support
    8/10/2015
  • With the release of Windows 10, TRENDnet is working tirelessly to ensure a smooth transition for our customers. We will be providing updates for selected TRENDnet products (with more to follow).
  • Router Security Advisory: Kcodes Netusb Kernel Stack Buffer Overflow
    5/21/2015
  • NetUSB suffers from a remotely exploitable kernel stack buffer overflow. Because of insufficient input validation, an overly long computer name can be used to overflow the "computer name" kernel stack buffer. This results in memory corruption which can be turned into arbitrary remote code execution.
  • TN-200/TN-200T1 Security Advisory
    1/28/2015
  • In regards to the recent published TN-200 and TN-200T1 vulnerabilities referencing CVE-2014-1628, CVE-2014-1629, CVE-2014-1630, CVE-2014-2703, and CVE-2014-2704: TRENDnet was first aware of these on August 18, 2014 and worked to immediately release corrective firmware (version 1.04) on October 20, 2014. We advise you to apply the latest firmware update to the TN-200 and TN-200T1. Download TN-200 firmware here. Download TN-200T1 firmware here. Please contact us at 866-845-3673 with any questions. To locate a Technical Support number in your area, please visit http://www.trendnet.com/support/contact.asp.
  • TRENDnet Heartbleed Security Advisory
    4/15/2014
  • TRENDnet executed a complete review of all products. Some TRENDnet products do use OpenSSL however the respective products use a different OpenSSL version which is not impacted by this vulnerability. No current TRENDnet products are vulnerable to the "Heartbleed" Vulnerability and no action is required by TRENDnet customers.
  • IP Camera Critical Firmware Updates
    9/27/2013
  • If you purchased TRENDnet IP cameras between April 2010 and February 2012, and have not updated firmware after February, 2012, we advise you to apply the latest security firmware update on the cameras. If you have any questions regarding the security firmware update on the cameras, please contact us at 866-845-3673 or ipcam@trendnet.com.
  • UPnP Vulnerability
    2/14/2013
  • Universal Plug and Play (UPnP), a protocol present in most network enabled devices, has been identified as vulnerable to one or more security flaws. Read more to see if your TRENDnet product may be affected.