cve/2021/CVE-2021-20161.md
2025-09-29 21:09:30 +02:00

18 lines
861 B
Markdown

### [CVE-2021-20161](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20161)
![](https://img.shields.io/static/v1?label=Product&message=Trendnet%20AC2600%20TEW-827DRU&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.08B01%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Access%20Control&color=brightgreen)
### Description
Trendnet AC2600 TEW-827DRU version 2.08B01 does not have sufficient protections for the UART functionality. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection. No username or password is required and the user is given a root shell with full control of the device.
### POC
#### Reference
- https://www.tenable.com/security/research/tra-2021-54
#### Github
No PoCs found on GitHub currently.