First published: Thu Dec 30 2021(Updated: )
Trendnet AC2600 TEW-827DRU version 2.08B01 contains a flaw in the session management for the device. The router's management software manages web sessions based on IP address rather than verifying client cookies/session tokens/etc. This allows an attacker (whether from a different computer, different web browser on the same machine, etc.) to take over an existing session. This does require the attacker to be able to spoof or take over original IP address of the original user's session.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
TRENDnet TEW-827DRU firmware | =2.08b01 | |
TRENDnet TEW-827DRU | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20151 is rated as a high severity vulnerability due to improper session management.
To fix CVE-2021-20151, update the Trendnet TEW-827DRU firmware to the latest version provided by the manufacturer.
CVE-2021-20151 affects the Trendnet TEW-827DRU router running firmware version 2.08B01.
CVE-2021-20151 allows attackers to potentially hijack web sessions by exploiting the reliance on IP address for session management.
There are no known workarounds for CVE-2021-20151, it is recommended to update to the patched firmware as the primary mitigation.