CVE-2021-20156
Summary
| CVE | CVE-2021-20156 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-12-30 22:15:00 UTC |
| Updated | 2022-01-07 17:33:00 UTC |
| Description | Trendnet AC2600 TEW-827DRU version 2.08B01 contains an improper access control configuration that could allow for a malicious firmware update. It is possible to manually install firmware that may be malicious in nature as there does not appear to be any signature validation done to determine if it is from a known and trusted source. This includes firmware updates that are done via the automated "check for updates" in the admin interface. If an attacker is able to masquerade as the update server, the device will not verify that the firmware updates downloaded are legitimate. |
Risk And Classification
Problem Types: CWE-347
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Trendnet | Tew-827dru | 2.0 | All | All | All |
| Operating System | Trendnet | Tew-827dru Firmware | 2.08b01 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Trendnet AC2600 TEW-827DRU Multiple Vulnerabilities - Research Advisory | Tenable® | MISC | www.tenable.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.