CVE-2021-20165

8.8 HIGH

📋 TL;DR

This CVE describes a Cross-Site Request Forgery (CSRF) vulnerability in Trendnet AC2600 TEW-827DRU routers. Attackers can trick authenticated users into performing unintended actions on the router's web interface, potentially changing settings or compromising the device. This affects users of the vulnerable router firmware version.

💻 Affected Systems

Products:
  • Trendnet AC2600 TEW-827DRU
Versions: 2.08B01
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web management interface. Requires attacker to lure authenticated user to malicious site.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router compromise allowing attacker to change DNS settings, enable remote administration, steal credentials, or brick the device.

🟠

Likely Case

Unauthorized configuration changes leading to network disruption, DNS hijacking, or credential theft.

🟢

If Mitigated

Limited impact with proper network segmentation and user awareness training.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction but CSRF bypass is trivial. Tenable research provides technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Trendnet for latest firmware

Vendor Advisory: https://www.trendnet.com/support/

Restart Required: Yes

Instructions:

1. Log into Trendnet support portal. 2. Download latest firmware for TEW-827DRU. 3. Upload via router web interface. 4. Reboot router.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate router management interface from user networks

Browser CSRF Protection

all

Use browser extensions that detect CSRF attempts

🧯 If You Can't Patch

  • Disable remote management and only access router from trusted internal network
  • Implement strict same-origin policies and use anti-CSRF browser extensions

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in web interface under Administration > Firmware

Check Version:

Login to router web interface and navigate to firmware section

Verify Fix Applied:

Verify firmware version is newer than 2.08B01 and test CSRF token validation

📡 Detection & Monitoring

Log Indicators:

  • Multiple configuration changes from same IP in short time
  • Unexpected POST requests to router endpoints

Network Indicators:

  • Cross-origin requests to router management interface
  • Suspicious referrer headers

SIEM Query:

source="router_logs" AND (action="config_change" OR uri="/apply.cgi") AND count() > 5 within 1m

🔗 References

📤 Share & Export