Trendnet AC2600 TEW-827DRU version 2.08B01 contains a flaw in the session management for the device. The router's management software manages web sessions based on IP address rather than verifying client cookies/session tokens/etc. This allows an attacker (whether from a different computer, different web browser on the same machine, etc.) to take over an existing session. This does require the attacker to be able to spoof or take over original IP address of the original user's session.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2021-54 | Third Party Advisory |
https://www.tenable.com/security/research/tra-2021-54 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.tenable.com/security/research/tra-2021-54 - Third Party Advisory |
Information
Published : 2021-12-30 22:15
Updated : 2024-11-21 05:46
NVD link : CVE-2021-20151
Mitre link : CVE-2021-20151
CVE.ORG link : CVE-2021-20151
JSON object : View
Products Affected
trendnet
- tew-827dru
- tew-827dru_firmware
CWE
CWE-384
Session Fixation