Page 14 of 130 results (0.271 seconds)

CVSS: 4.9EPSS: 0%CPEs: 2EXPL: 0

Trendnet AC2600 TEW-827DRU version 2.08B01 stores credentials in plaintext. Usernames and passwords are stored in plaintext in the config files on the device. For example, /etc/config/cameo contains the admin password in plaintext. Trendnet AC2600 TEW-827DRU versión 2.08B01, almacena las credenciales en texto plano. Los nombres de usuario y las contraseñas se almacenan en texto plano en los archivos de configuración del dispositivo. • https://www.tenable.com/security/research/tra-2021-54 • CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Trendnet AC2600 TEW-827DRU version 2.08B01 does not have sufficient protections for the UART functionality. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection. No username or password is required and the user is given a root shell with full control of the device. Trendnet AC2600 TEW-827DRU versión 2.08B01, no presenta suficientes protecciones para la funcionalidad UART. Un actor malicioso con acceso físico al dispositivo es capaz de conectarse al puerto UART por medio de una conexión serial. • https://www.tenable.com/security/research/tra-2021-54 • CWE-287: Improper Authentication CWE-306: Missing Authentication for Critical Function •

CVSS: 9.0EPSS: 0%CPEs: 2EXPL: 1

Trendnet AC2600 TEW-827DRU version 2.08B01 contains a command injection vulnerability in the smb functionality of the device. The username parameter used when configuring smb functionality for the device is vulnerable to command injection as root. Trendnet AC2600 TEW-827DRU versión 2.08B01, contiene una vulnerabilidad de inyección de comandos en la funcionalidad smb del dispositivo. El parámetro username usado cuando es configurada la funcionalidad smb para el dispositivo es vulnerable a una inyección de comandos como root. • https://www.tenable.com/security/research/tra-2021-54 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 1

Trendnet AC2600 TEW-827DRU version 2.08B01 makes use of hardcoded credentials. It is possible to backup and restore device configurations via the management web interface. These devices are encrypted using a hardcoded password of "12345678". Trendnet AC2600 TEW-827DRU versión 2.08B01, usa credenciales embebidas. Es posible hacer una copia de seguridad y restaurar las configuraciones del dispositivo por medio de la interfaz web de administración. • https://www.tenable.com/security/research/tra-2021-54 • CWE-798: Use of Hard-coded Credentials •

CVSS: 6.9EPSS: 0%CPEs: 2EXPL: 0

Trendnet AC2600 TEW-827DRU version 2.08B01 contains a symlink vulnerability in the bittorrent functionality. If enabled, the bittorrent functionality is vulnerable to a symlink attack that could lead to remote code execution on the device. If an end user inserts a flash drive with a malicious symlink on it that the bittorrent client can write downloads to, then a user is able to download arbitrary files to any desired location on the devices filesystem, which could lead to remote code execution. Example directories vulnerable to this include "config", "downloads", and "torrents", though it should be noted that "downloads" is the only vector that allows for arbitrary files to be downloaded to arbitrary locations. Trendnet AC2600 TEW-827DRU versión 2.08B01, contiene una vulnerabilidad de symlink en la funcionalidad bittorrent. • https://www.tenable.com/security/research/tra-2021-54 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •