CVE-2021-20165

Trendnet AC2600 TEW-827DRU version 2.08B01 does not properly implement csrf protections. Most pages lack proper usage of CSRF protections or mitigations. Additionally, pages that do make use of CSRF tokens are trivially bypassable as the server does not appear to validate them properly (i.e. re-using an old token or finding the token thru some other method is possible).
References
Link Resource
https://www.tenable.com/security/research/tra-2021-54 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:trendnet:tew-827dru_firmware:2.08b01:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:tew-827dru:2.0:*:*:*:*:*:*:*

History

07 Jan 2022, 17:41

Type Values Removed Values Added
CPE cpe:2.3:h:trendnet:tew-827dru:2.0:*:*:*:*:*:*:*
cpe:2.3:o:trendnet:tew-827dru_firmware:2.08b01:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 6.8
v3 : 8.8
References (MISC) https://www.tenable.com/security/research/tra-2021-54 - (MISC) https://www.tenable.com/security/research/tra-2021-54 - Exploit, Third Party Advisory
CWE CWE-352

30 Dec 2021, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-12-30 22:15

Updated : 2024-02-04 22:08


NVD link : CVE-2021-20165

Mitre link : CVE-2021-20165

CVE.ORG link : CVE-2021-20165


JSON object : View

Products Affected

trendnet

  • tew-827dru_firmware
  • tew-827dru
CWE
CWE-352

Cross-Site Request Forgery (CSRF)