cve/2021/CVE-2021-20161.md

18 lines
848 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-20161](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20161)
![](https://img.shields.io/static/v1?label=Product&message=Trendnet%20AC2600%20TEW-827DRU&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Access%20Control&color=brighgreen)
### Description
Trendnet AC2600 TEW-827DRU version 2.08B01 does not have sufficient protections for the UART functionality. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection. No username or password is required and the user is given a root shell with full control of the device.
### POC
#### Reference
- https://www.tenable.com/security/research/tra-2021-54
#### Github
No PoCs found on GitHub currently.