CVE-2021-20156

Trendnet AC2600 TEW-827DRU version 2.08B01 contains an improper access control configuration that could allow for a malicious firmware update. It is possible to manually install firmware that may be malicious in nature as there does not appear to be any signature validation done to determine if it is from a known and trusted source. This includes firmware updates that are done via the automated "check for updates" in the admin interface. If an attacker is able to masquerade as the update server, the device will not verify that the firmware updates downloaded are legitimate.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:trendnet:tew-827dru_firmware:2.08b01:*:*:*:*:*:*:*
cpe:2.3:h:trendnet:tew-827dru:2.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:46

Type Values Removed Values Added
References () https://www.tenable.com/security/research/tra-2021-54 - Third Party Advisory () https://www.tenable.com/security/research/tra-2021-54 - Third Party Advisory

Information

Published : 2021-12-30 22:15

Updated : 2024-11-21 05:46


NVD link : CVE-2021-20156

Mitre link : CVE-2021-20156

CVE.ORG link : CVE-2021-20156


JSON object : View

Products Affected

trendnet

  • tew-827dru
  • tew-827dru_firmware
CWE
CWE-347

Improper Verification of Cryptographic Signature