First published: Fri Feb 12 2021(Updated: )
Cross-site request forgery (CSRF) vulnerability in ELECOM WRC-300FEBK-A allows remote attackers to hijack the authentication of administrators and execute an arbitrary request via unspecified vector. As a result, the device settings may be altered and/or telnet daemon may be started.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Elecom Wrc-300febk-a Firmware | ||
ELECOM WRC-300FEBK-A |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-20646.
The severity of CVE-2021-20646 is medium with a CVSS score of 6.5.
The affected software in CVE-2021-20646 is ELECOM WRC-300FEBK-A firmware.
The CSRF vulnerability in ELECOM WRC-300FEBK-A allows remote attackers to hijack the authentication of administrators and execute an arbitrary request via an unspecified vector.
If the CSRF vulnerability in ELECOM WRC-300FEBK-A is exploited, the device settings may be altered and/or the telnet daemon may be started.
To fix CVE-2021-20646, it is recommended to apply the security patch or update provided by ELECOM.
You can find more information about CVE-2021-20646 on the JVN and ELECOM websites.