### [CVE-2021-20161](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20161) ![](https://img.shields.io/static/v1?label=Product&message=Trendnet%20AC2600%20TEW-827DRU&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=2.08B01%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Access%20Control&color=brightgreen) ### Description Trendnet AC2600 TEW-827DRU version 2.08B01 does not have sufficient protections for the UART functionality. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection. No username or password is required and the user is given a root shell with full control of the device. ### POC #### Reference - https://www.tenable.com/security/research/tra-2021-54 #### Github No PoCs found on GitHub currently.