Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 19 Jan 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ubeeinteractive
Ubeeinteractive ubee Evw327 |
|
| Vendors & Products |
Ubeeinteractive
Ubeeinteractive ubee Evw327 |
Fri, 16 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 16 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Ubee EVW327 contains a cross-site request forgery vulnerability that allows attackers to enable remote access without user interaction. Attackers can craft a malicious webpage that automatically submits a form to change router remote access settings to port 8080 without the user's consent. | |
| Title | Ubee EVW327 - 'Enable Remote Access' Cross-Site Request Forgery (CSRF) | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-16T21:11:04.439Z
Reserved: 2026-01-14T17:11:19.896Z
Link: CVE-2021-47820
Updated: 2026-01-16T21:02:20.391Z
Status : Deferred
Published: 2026-01-16T19:16:06.530
Modified: 2026-04-15T00:35:42.020
Link: CVE-2021-47820
No data.
OpenCVE Enrichment
Updated: 2026-01-19T09:20:29Z