The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-47820

CVE-2021-47820: Ubee EVW327 CSRF Vulnerability

CVE-2021-47820 is a cross-site request forgery flaw in Ubee EVW327 routers that enables attackers to change remote access settings without user consent. This article covers the technical details, impact, and mitigation.

Published: January 23, 2026

CVE-2021-47820 Overview

CVE-2021-47820 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the Ubee EVW327 router. This vulnerability allows attackers to craft malicious webpages that automatically submit forms to change the router's remote access settings to port 8080 without the user's knowledge or consent. When a victim visits the attacker's malicious page while authenticated to their router, the CSRF attack executes automatically, enabling remote access to the device.

Critical Impact

Successful exploitation enables unauthorized remote access to the router's management interface, potentially allowing attackers to modify network configurations, intercept traffic, or use the compromised device as a pivot point for further attacks.

Affected Products

  • Ubee EVW327 Router

Discovery Timeline

  • 2026-01-16 - CVE CVE-2021-47820 published to NVD
  • 2026-01-16 - Last updated in NVD database

Technical Details for CVE-2021-47820

Vulnerability Analysis

This vulnerability is classified under CWE-352 (Cross-Site Request Forgery), which occurs when web applications do not adequately verify that requests originate from legitimate user actions. In the case of the Ubee EVW327, the router's administrative interface fails to implement proper CSRF protections when processing requests to modify remote access settings.

The attack requires user interaction—specifically, the victim must visit a malicious webpage while having an active authenticated session with their router. Once triggered, the attack silently submits a request that enables remote management on port 8080, giving the attacker external access to the router's administrative functions.

Root Cause

The root cause of this vulnerability is the absence of anti-CSRF tokens or other request validation mechanisms in the Ubee EVW327's web management interface. The router accepts configuration changes based solely on the presence of valid session cookies, without verifying that the request originated from a legitimate form submission within the administrative interface. This allows attackers to forge requests that appear to come from authenticated users.

Attack Vector

The attack is network-based and requires user interaction. An attacker creates a malicious webpage containing a hidden form that targets the Ubee EVW327's remote access configuration endpoint. When an authenticated user visits this page, the form automatically submits—leveraging the user's existing session cookies—to enable remote access on port 8080. The attacker can then access the router's management interface from the internet.

The malicious webpage typically contains an auto-submitting HTML form with pre-configured values to enable remote access. When loaded in the victim's browser, JavaScript or an onload event triggers form submission to the router's configuration endpoint. Since the browser automatically includes session cookies with the request, the router processes it as a legitimate configuration change.

Technical details and proof-of-concept information can be found in the Exploit-DB entry #49920 and the Vulncheck Advisory.

Detection Methods for CVE-2021-47820

Indicators of Compromise

  • Unexpected changes to router remote access settings, particularly enabling remote management on port 8080
  • Router management interface accessible from external networks when it should be internal-only
  • Browser history showing visits to suspicious or unknown websites prior to configuration changes
  • Unusual outbound connections originating from the router's management port

Detection Strategies

  • Monitor router configuration changes for unauthorized modifications to remote access settings
  • Implement network monitoring to detect external access attempts to router management ports (especially port 8080)
  • Review web server logs on the router for configuration change requests originating from unexpected referrer URLs
  • Deploy network intrusion detection rules to identify CSRF attack patterns targeting router endpoints

Monitoring Recommendations

  • Regularly audit router configurations to verify remote access settings remain as intended
  • Set up alerts for any configuration changes to the Ubee EVW327 management interface
  • Monitor for external connection attempts to the router's management port from untrusted IP addresses
  • Implement logging for all administrative actions on network infrastructure devices

How to Mitigate CVE-2021-47820

Immediate Actions Required

  • Disable remote management access on the Ubee EVW327 if not explicitly required
  • Ensure router administrative sessions are logged out when not in use
  • Use a separate browser or incognito mode when accessing router administration to prevent session-based attacks
  • Verify current remote access settings have not been modified without authorization

Patch Information

No vendor patch information is currently available for this vulnerability. Users should check with Ubee Interactive for firmware updates that may address this CSRF vulnerability. Additional technical details are available in the Vulncheck Advisory.

Workarounds

  • Disable remote management entirely if it is not required for network operations
  • Place the router behind an additional firewall that blocks external access to management ports
  • Change the default administrative credentials to strong, unique passwords
  • Log out of the router administrative interface immediately after making changes to minimize the session exposure window
bash
# Verify remote access is disabled (example verification steps)
# Check router configuration page for remote management settings
# Ensure "Remote Management" or "Remote Access" is set to DISABLED
# Verify no firewall rules are allowing external access to port 8080
# Consider blocking port 8080 at the network perimeter as additional protection

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeCSRF

  • Vendor/TechUbee

  • SeverityMEDIUM

  • CVSS Score5.1

  • EPSS Probability0.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityLow
  • AvailabilityNone
  • CWE References
  • CWE-352
  • Technical References
  • Exploit-DB #49920

  • Ubee Interactive Homepage

  • Vulncheck Advisory on Ubee CSRF
  • Latest CVEs
  • CVE-2025-70797: LimeSurvey XSS Vulnerability

  • CVE-2025-30650: Juniper Junos OS Auth Bypass Vulnerability

  • CVE-2026-35471: Goshs Path Traversal Vulnerability

  • CVE-2026-35393: Goshs Path Traversal Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English