First published: Thu Jan 28 2021(Updated: )
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
NEC Aterm WG2600HP firmware | <=1.0.2 | |
NEC Aterm WG2600HP | ||
NEC Aterm WG2600HP2 firmware | <=1.0.2 | |
NEC Aterm WG2600HP2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20621 is classified as a high severity vulnerability due to its potential for remote exploitation via CSRF.
To fix CVE-2021-20621, you should update the Aterm WG2600HP or WG2600HP2 firmware to a version later than 1.0.2.
CVE-2021-20621 can be exploited through cross-site request forgery attacks, allowing unauthorized actions to be performed by an authenticated user.
Firmware versions 1.0.2 and earlier of both Aterm WG2600HP and WG2600HP2 are affected by CVE-2021-20621.
Administrators of NEC Aterm WG2600HP and WG2600HP2 devices are at risk of CVE-2021-20621 if they are using the vulnerable firmware versions.