Files
CVEs-PoC/2021/CVE-2021-32459.md
2025-09-29 21:09:30 +02:00

18 lines
951 B
Markdown

### [CVE-2021-32459](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32459)
![](https://img.shields.io/static/v1?label=Product&message=Trend%20Micro%20Home%20Network%20Security&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=6.6.604%20and%20below%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Hard%20Coded%20Password&color=brightgreen)
### Description
Trend Micro Home Network Security version 6.6.604 and earlier contains a hard-coded password vulnerability in the log collection server which could allow an attacker to use a specially crafted network request to lead to arbitrary authentication. An attacker must first obtain the ability to execute high-privileged code on the target device in order to exploit this vulnerability.
### POC
#### Reference
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1241
#### Github
No PoCs found on GitHub currently.