Trendnet AC2600 TEW-827DRU version 2.08B01 does not properly implement csrf protections. Most pages lack proper usage of CSRF protections or mitigations. Additionally, pages that do make use of CSRF tokens are trivially bypassable as the server does not appear to validate them properly (i.e. re-using an old token or finding the token thru some other method is possible).
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2021-54 | Exploit Third Party Advisory |
https://www.tenable.com/security/research/tra-2021-54 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.tenable.com/security/research/tra-2021-54 - Exploit, Third Party Advisory |
Information
Published : 2021-12-30 22:15
Updated : 2024-11-21 05:46
NVD link : CVE-2021-20165
Mitre link : CVE-2021-20165
CVE.ORG link : CVE-2021-20165
JSON object : View
Products Affected
trendnet
- tew-827dru
- tew-827dru_firmware
CWE
CWE-352
Cross-Site Request Forgery (CSRF)