VYPR
Medium severity5.3NVD Advisory· Published Jan 16, 2026· Updated Apr 15, 2026

CVE-2021-47820

CVE-2021-47820

Description

Ubee EVW327 contains a cross-site request forgery vulnerability that allows attackers to enable remote access without user interaction. Attackers can craft a malicious webpage that automatically submits a form to change router remote access settings to port 8080 without the user's consent.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Ubee EVW327 router is vulnerable to CSRF, allowing attackers to silently enable remote access on port 8080 via a crafted webpage.

Vulnerability

Overview

The Ubee EVW327 router contains a cross-site request forgery (CSRF) vulnerability in its remote access control. The router's web interface does not validate the origin of requests when processing the remote access configuration form. An attacker can craft a malicious HTML page that automatically submits a POST request to the endpoint /goform/UbeeMgmtRemoteAccess with parameters to enable remote access and set the port to 8080 [2][3].

Exploitation

Exploitation requires no authentication from the attacker, but relies on a logged-in router administrator visiting the attacker's page. The attack is performed without user interaction beyond the visit; the malicious form is submitted automatically via JavaScript. The router's default LAN IP (192.168.0.0.1 is used in the exploit, indicating the attack is typically launched from within the local network [3].

Impact

Successful exploitation enables remote administration of the router on TCP port 8080. This exposes the router's management interface to the internet, potentially allowing unauthorized remote attackers to gain full control of the device, modify settings, or intercept traffic. The CVSS v3 base score is 5.3 (Medium), reflecting the need for user interaction and network proximity [1][2].

Mitigation

As of the publication date, no official patch has been announced by Ubee Interactive. Users are advised to disable remote access if not needed, avoid clicking untrusted links while logged into the router, and consider using a firewall to restrict access to the router's management interface [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.