{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T16:49:14.559","vulnerabilities":[{"cve":{"id":"CVE-2021-20151","sourceIdentifier":"vulnreport@tenable.com","published":"2021-12-30T22:15:08.670","lastModified":"2024-11-21T05:46:01.250","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Trendnet AC2600 TEW-827DRU version 2.08B01 contains a flaw in the session management for the device. The router's management software manages web sessions based on IP address rather than verifying client cookies/session tokens/etc. This allows an attacker (whether from a different computer, different web browser on the same machine, etc.) to take over an existing session. This does require the attacker to be able to spoof or take over original IP address of the original user's session."},{"lang":"es","value":"Trendnet AC2600 TEW-827DRU versión 2.08B01, contiene un fallo en la administración de sesiones del dispositivo. El software de administración del router administra las sesiones web basándose en la dirección IP en lugar de verificar las cookies/tokens de sesión del cliente/etc. Esto permite a un atacante (ya sea desde un ordenador diferente, un navegador web distinto en la misma máquina, etc.) hacerse con una sesión existente. Esto requiere que el atacante sea capaz de falsificar o tomar la dirección IP original de la sesión del usuario original.\n"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":10.0,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":6.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-384"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:trendnet:tew-827dru_firmware:2.08b01:*:*:*:*:*:*:*","matchCriteriaId":"9C008C1E-18D3-4A0C-97A1-89009310C55B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:trendnet:tew-827dru:2.0:*:*:*:*:*:*:*","matchCriteriaId":"FA6A79A7-46A7-446F-B512-4C75B5C214CE"}]}]}],"references":[{"url":"https://www.tenable.com/security/research/tra-2021-54","source":"vulnreport@tenable.com","tags":["Third Party Advisory"]},{"url":"https://www.tenable.com/security/research/tra-2021-54","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}