Trendnet AC2600 TEW-827DRU version 2.08B01 does not have sufficient protections for the UART functionality. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection. No username or password is required and the user is given a root shell with full control of the device.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2021-54 | Third Party Advisory |
https://www.tenable.com/security/research/tra-2021-54 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.tenable.com/security/research/tra-2021-54 - Third Party Advisory |
12 Jul 2022, 17:42
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-306 CWE-287 |
07 Jan 2022, 17:40
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.tenable.com/security/research/tra-2021-54 - Third Party Advisory | |
CWE | CWE-326 | |
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 6.8 |
CPE | cpe:2.3:h:trendnet:tew-827dru:2.0:*:*:*:*:*:*:* cpe:2.3:o:trendnet:tew-827dru_firmware:2.08b01:*:*:*:*:*:*:* |
30 Dec 2021, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-12-30 22:15
Updated : 2024-11-21 05:46
NVD link : CVE-2021-20161
Mitre link : CVE-2021-20161
CVE.ORG link : CVE-2021-20161
JSON object : View
Products Affected
trendnet
- tew-827dru
- tew-827dru_firmware