Description
Trendnet AC2600 TEW-827DRU version 2.08B01 does not have sufficient protections for the UART functionality. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection. No username or password is required and the user is given a root shell with full control of the device.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-7618 | Trendnet AC2600 TEW-827DRU version 2.08B01 does not have sufficient protections for the UART functionality. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection. No username or password is required and the user is given a root shell with full control of the device. |
References
| Link | Providers |
|---|---|
| https://www.tenable.com/security/research/tra-2021-54 |
|
History
No history.
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2024-08-03T17:30:07.472Z
Reserved: 2020-12-17T00:00:00.000Z
Link: CVE-2021-20161
No data.
Status : Modified
Published: 2021-12-30T22:15:09.157
Modified: 2024-11-21T05:46:02.430
Link: CVE-2021-20161
No data.
OpenCVE Enrichment
No data.
EUVD