### [CVE-2021-32459](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32459) ![](https://img.shields.io/static/v1?label=Product&message=Trend%20Micro%20Home%20Network%20Security&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Hard%20Coded%20Password&color=brighgreen) ### Description Trend Micro Home Network Security version 6.6.604 and earlier contains a hard-coded password vulnerability in the log collection server which could allow an attacker to use a specially crafted network request to lead to arbitrary authentication. An attacker must first obtain the ability to execute high-privileged code on the target device in order to exploit this vulnerability. ### POC #### Reference - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1241 #### Github No PoCs found on GitHub currently.