Vulnerabilites related to draytek - vigor2925
CVE-2024-51138 (GCVE-0-2024-51138)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-51138", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-28T16:59:55.612494Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121 Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-28T21:31:37.139Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Vigor165/166 4.2.7 and earlier; Vigor2620/LTE200 3.9.8.9 and earlier; Vigor2860/2925 3.9.8 and earlier; Vigor2862/2926 3.9.9.5 and earlier; Vigor2133/2762/2832 3.9.9 and earlier; Vigor2135/2765/2766 4.4.5. and earlier; Vigor2865/2866/2927 4.4.5.3 and earlier; Vigor2962 4.3.2.8 and earlier; Vigor3912 4.3.6.1 and earlier; Vigor3910 4.4.3.1 and earlier a stack-based buffer overflow vulnerability has been identified in the URL parsing functionality of the TR069 STUN server. This flaw occurs due to insufficient bounds checking on the amount of URL parameters, allowing an attacker to exploit the overflow by sending a maliciously crafted request. Consequently, a remote attacker can execute arbitrary code with elevated privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-27T20:46:11.945Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "http://draytek.com" }, { "url": "https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-51138", "datePublished": "2025-02-27T00:00:00.000Z", "dateReserved": "2024-10-28T00:00:00.000Z", "dateUpdated": "2025-02-28T21:31:37.139Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-41340 (GCVE-0-2024-41340)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-41340", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-28T16:58:48.633348Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-28T21:44:05.694Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue in Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 allows attackers to upload crafted APP Enforcement modules, leading to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-27T20:42:52.869Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "http://draytek.com" }, { "url": "https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-41340", "datePublished": "2025-02-27T00:00:00.000Z", "dateReserved": "2024-07-18T00:00:00.000Z", "dateUpdated": "2025-02-28T21:44:05.694Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-41339 (GCVE-0-2024-41339)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-41339", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-06T18:07:03.272786Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-06T18:07:42.843Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue in the CGI endpoint used to upload configurations in Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 allows attackers to upload a crafted kernel module, allowing for arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-27T20:41:03.831Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "http://draytek.com" }, { "url": "https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-41339", "datePublished": "2025-02-27T00:00:00.000Z", "dateReserved": "2024-07-18T00:00:00.000Z", "dateUpdated": "2025-05-06T18:07:42.843Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-41334 (GCVE-0-2024-41334)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-41334", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-06T18:05:40.282159Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-06T18:05:50.033Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 were discovered to not utilize certificate verification, allowing attackers to upload crafted APPE modules from non-official servers, leading to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-27T20:44:23.405Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "http://draytek.com" }, { "url": "https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-41334", "datePublished": "2025-02-27T00:00:00.000Z", "dateReserved": "2024-07-18T00:00:00.000Z", "dateUpdated": "2025-05-06T18:05:50.033Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-51139 (GCVE-0-2024-51139)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-51139", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-28T16:59:54.401854Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-28T17:23:14.780Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerability in Vigor2620/LTE200 3.9.8.9 and earlier and Vigor2860/2925 3.9.8 and earlier and Vigor2862/2926 3.9.9.5 and earlier and Vigor2133/2762/2832 3.9.9 and earlier and Vigor165/166 4.2.7 and earlier and Vigor2135/2765/2766 4.4.5.1 and earlier and Vigor2865/2866/2927 4.4.5.3 and earlier and Vigor2962/3910 4.3.2.8/4.4.3.1 and earlier and Vigor3912 4.3.6.1 and earlier allows a remote attacker to execute arbitrary code via the CGI parser\u0027s handling of the \"Content-Length\" header of HTTP POST requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-27T20:47:37.278Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "http://draytek.com" }, { "url": "https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-51139", "datePublished": "2025-02-27T00:00:00.000Z", "dateReserved": "2024-10-28T00:00:00.000Z", "dateUpdated": "2025-02-28T17:23:14.780Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-41594 (GCVE-0-2024-41594)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-41594", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-19T15:22:51.555504Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-326", "description": "CWE-326 Inadequate Encryption Strength", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-19T15:38:27.511Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue in DrayTek Vigor310 devices through 4.3.2.6 allows an attacker to obtain sensitive information because the httpd server of the Vigor management UI uses a static string for seeding the PRNG of OpenSSL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-03T18:29:39.340Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.forescout.com/resources/draytek14-vulnerabilities" }, { "url": "https://www.forescout.com/resources/draybreak-draytek-research/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-41594", "datePublished": "2024-10-03T00:00:00.000Z", "dateReserved": "2024-07-18T00:00:00.000Z", "dateUpdated": "2025-03-19T15:38:27.511Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-41587 (GCVE-0-2024-41587)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-41587", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T20:24:15.931214Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-18T15:15:51.880Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Stored XSS, by authenticated users, is caused by poor sanitization of the Login Page Greeting message in DrayTek Vigor310 devices through 4.3.2.6." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-03T18:25:02.832Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.forescout.com/resources/draytek14-vulnerabilities" }, { "url": "https://www.forescout.com/resources/draybreak-draytek-research/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-41587", "datePublished": "2024-10-03T00:00:00.000Z", "dateReserved": "2024-07-18T00:00:00.000Z", "dateUpdated": "2025-03-18T15:15:51.880Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-41588 (GCVE-0-2024-41588)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "vigor3910_firmware", "vendor": "draytek", "versions": [ { "lessThanOrEqual": "4.3.2.6", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-41588", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T19:08:19.714245Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-04T19:09:42.672Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The CGI endpoints v2x00.cgi and cgiwcg.cgi of DrayTek Vigor3910 devices through 4.3.2.6 are vulnerable to buffer overflows, by authenticated users, because of missing bounds checking on parameters passed through POST requests to the strncpy function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-03T18:25:20.243350", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.forescout.com/resources/draytek14-vulnerabilities" }, { "url": "https://www.forescout.com/resources/draybreak-draytek-research/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-41588", "datePublished": "2024-10-03T00:00:00", "dateReserved": "2024-07-18T00:00:00", "dateUpdated": "2024-10-04T19:09:42.672Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-41590 (GCVE-0-2024-41590)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "vigor3910_firmware", "vendor": "draytek", "versions": [ { "lessThanOrEqual": "4.3.2.6", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-41590", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T20:31:37.882815Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121 Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-03T20:38:44.420Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Several CGI endpoints are vulnerable to buffer overflows, by authenticated users, because of missing bounds checking on parameters passed through POST requests to the strcpy function on DrayTek Vigor310 devices through 4.3.2.6." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-03T18:26:05.030610", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.forescout.com/resources/draytek14-vulnerabilities" }, { "url": "https://www.forescout.com/resources/draybreak-draytek-research/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-41590", "datePublished": "2024-10-03T00:00:00", "dateReserved": "2024-07-18T00:00:00", "dateUpdated": "2024-10-03T20:38:44.420Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-41591 (GCVE-0-2024-41591)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-41591", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T19:14:46.529762Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-14T15:36:23.805Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-03T18:26:22.678Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.forescout.com/resources/draytek14-vulnerabilities" }, { "url": "https://www.forescout.com/resources/draybreak-draytek-research/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-41591", "datePublished": "2024-10-03T00:00:00.000Z", "dateReserved": "2024-07-18T00:00:00.000Z", "dateUpdated": "2025-03-14T15:36:23.805Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-41592 (GCVE-0-2024-41592)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "vigor3910_firmware", "vendor": "draytek", "versions": [ { "lessThanOrEqual": "4.3.2.6", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-41592", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T18:56:58.532037Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121 Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-03T18:59:51.817Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "DrayTek Vigor3910 devices through 4.3.2.6 have a stack-based overflow when processing query string parameters because GetCGI mishandles extraneous ampersand characters and long key-value pairs." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-03T18:26:39.546871", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.forescout.com/resources/draytek14-vulnerabilities" }, { "url": "https://www.forescout.com/resources/draybreak-draytek-research/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-41592", "datePublished": "2024-10-03T00:00:00", "dateReserved": "2024-07-18T00:00:00", "dateUpdated": "2024-10-03T18:59:51.817Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-41338 (GCVE-0-2024-41338)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-41338", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-28T14:30:53.659267Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-28T14:32:28.132Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A NULL pointer dereference in Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 allows attackers to cause a Denial of Service (DoS) via a crafted DHCP request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-27T20:39:41.165Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "http://draytek.com" }, { "url": "https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-41338", "datePublished": "2025-02-27T00:00:00.000Z", "dateReserved": "2024-07-18T00:00:00.000Z", "dateUpdated": "2025-02-28T14:32:28.132Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-41596 (GCVE-0-2024-41596)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "vigor3910_firmware", "vendor": "draytek", "versions": [ { "lessThanOrEqual": "4.3.2.6", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-41596", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T18:56:36.553141Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-03T19:04:38.581Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerabilities exist in DrayTek Vigor310 devices through 4.3.2.6 (in the Vigor management UI) because of improper retrieval and handling of the CGI form parameters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-03T18:30:24.782005", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.forescout.com/resources/draytek14-vulnerabilities" }, { "url": "https://www.forescout.com/resources/draybreak-draytek-research/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-41596", "datePublished": "2024-10-03T00:00:00", "dateReserved": "2024-07-18T00:00:00", "dateUpdated": "2024-10-03T19:04:38.581Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-41593 (GCVE-0-2024-41593)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-41593", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-13T18:07:09.851527Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-13T18:11:33.093Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-03T18:29:21.947Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.forescout.com/resources/draytek14-vulnerabilities" }, { "url": "https://www.forescout.com/resources/draybreak-draytek-research/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-41593", "datePublished": "2024-10-03T00:00:00.000Z", "dateReserved": "2024-07-18T00:00:00.000Z", "dateUpdated": "2025-03-13T18:11:33.093Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-202410-0075
Vulnerability from variot
Stored XSS, by authenticated users, is caused by poor sanitization of the Login Page Greeting message in DrayTek Vigor310 devices through 4.3.2.6. DrayTek Corporation of vigor3910 Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202410-0075", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "vigor3912", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.3.6.1" }, { "model": "vigor3910", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.3.1" }, { "model": "vigor2866", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.2" }, { "model": "vigor3910", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.3.2.8" }, { "model": "vigor2832", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2860", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2962", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.3.1" }, { "model": "vigor165", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.2.7" }, { "model": "vigor2925", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2763", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.3" }, { "model": "vigor2962", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.3.2.8" }, { "model": "vigor2915", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.3" }, { "model": "vigorlte200", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2926", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor3220", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2135", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.3" }, { "model": "vigor2952", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2762", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2865", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.2" }, { "model": "vigor2962", "scope": "gte", "trust": 1.0, "vendor": "draytek", "version": "4.4.0.0" }, { "model": "vigor2765", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.3" }, { "model": "vigor2620", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2766", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.3" }, { "model": "vigor1000b", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.3.1" }, { "model": "vigor2862", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor3910", "scope": "gte", "trust": 1.0, "vendor": "draytek", "version": "4.4.0.0" }, { "model": "vigor1000b", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.3.2.8" }, { "model": "vigor166", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.2.7" }, { "model": "vigor2133", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor1000b", "scope": "gte", "trust": 1.0, "vendor": "draytek", "version": "4.4.0.0" }, { "model": "vigor3910", "scope": "eq", "trust": 0.8, "vendor": "draytek", "version": "vigor3910 firmware 4.3.2.8" }, { "model": "vigor3910", "scope": "eq", "trust": 0.8, "vendor": "draytek", "version": "vigor3910 firmware 4.4.0.0 that\u0027s all 4.4.3.1" }, { "model": "vigor3910", "scope": "eq", "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor3910", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-009832" }, { "db": "NVD", "id": "CVE-2024-41587" } ] }, "cve": "CVE-2024-41587", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.3, "id": "CVE-2024-41587", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.4, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2024-41587", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "Low", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2024-41587", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2024-41587", "trust": 0.8, "value": "Medium" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-009832" }, { "db": "NVD", "id": "CVE-2024-41587" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stored XSS, by authenticated users, is caused by poor sanitization of the Login Page Greeting message in DrayTek Vigor310 devices through 4.3.2.6. DrayTek Corporation of vigor3910 Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2024-41587" }, { "db": "JVNDB", "id": "JVNDB-2024-009832" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2024-41587", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2024-009832", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-009832" }, { "db": "NVD", "id": "CVE-2024-41587" } ] }, "id": "VAR-202410-0075", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.6666667 }, "last_update_date": "2024-10-08T23:27:00.949000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.0 }, { "problemtype": "Cross-site scripting (CWE-79) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-009832" }, { "db": "NVD", "id": "CVE-2024-41587" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://www.forescout.com/resources/draybreak-draytek-research/" }, { "trust": 1.0, "url": "https://www.forescout.com/resources/draytek14-vulnerabilities" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2024-41587" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-009832" }, { "db": "NVD", "id": "CVE-2024-41587" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "JVNDB", "id": "JVNDB-2024-009832" }, { "db": "NVD", "id": "CVE-2024-41587" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-10-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2024-009832" }, { "date": "2024-10-03T19:15:04.310000", "db": "NVD", "id": "CVE-2024-41587" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-10-07T03:05:00", "db": "JVNDB", "id": "JVNDB-2024-009832" }, { "date": "2024-10-08T15:32:18.313000", "db": "NVD", "id": "CVE-2024-41587" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "DrayTek\u00a0Corporation\u00a0 of \u00a0vigor3910\u00a0 Cross-site scripting vulnerability in firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-009832" } ], "trust": 0.8 } }
var-202410-0179
Vulnerability from variot
An issue in DrayTek Vigor310 devices through 4.3.2.6 allows an attacker to obtain sensitive information because the httpd server of the Vigor management UI uses a static string for seeding the PRNG of OpenSSL. vigor2620 firmware, vigor2915 firmware, vigor2866 firmware etc. DrayTek Corporation The product contains a cryptographic strength vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202410-0179", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "vigor2866", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.2" }, { "model": "vigor3910", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.3.1" }, { "model": "vigor3912", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.3.6.1" }, { "model": "vigor3910", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.3.2.8" }, { "model": "vigor2832", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2860", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2962", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.3.1" }, { "model": "vigor165", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.2.7" }, { "model": "vigor2925", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2763", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.3" }, { "model": "vigor2962", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.3.2.8" }, { "model": "vigor2915", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.3" }, { "model": "vigorlte200", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2926", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor3220", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2135", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.3" }, { "model": "vigor2952", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2762", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2865", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.2" }, { "model": "vigor2962", "scope": "gte", "trust": 1.0, "vendor": "draytek", "version": "4.4.0.0" }, { "model": "vigor2765", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.3" }, { "model": "vigor2620", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2766", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.3" }, { "model": "vigor1000b", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.3.1" }, { "model": "vigor2862", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor3910", "scope": "gte", "trust": 1.0, "vendor": "draytek", "version": "4.4.0.0" }, { "model": "vigor166", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.2.7" }, { "model": "vigor1000b", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.3.2.8" }, { "model": "vigor2133", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor1000b", "scope": "gte", "trust": 1.0, "vendor": "draytek", "version": "4.4.0.0" }, { "model": "vigor2766", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2866", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2765", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2865", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor165", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2962", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor3910", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2133", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2762", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigorlte200", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor1000b", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2915", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor3912", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2620", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2763", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2135", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor166", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-009984" }, { "db": "NVD", "id": "CVE-2024-41594" } ] }, "cve": "CVE-2024-41594", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2024-41594", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2024-41594", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2024-41594", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2024-41594", "trust": 0.8, "value": "High" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-009984" }, { "db": "NVD", "id": "CVE-2024-41594" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue in DrayTek Vigor310 devices through 4.3.2.6 allows an attacker to obtain sensitive information because the httpd server of the Vigor management UI uses a static string for seeding the PRNG of OpenSSL. vigor2620 firmware, vigor2915 firmware, vigor2866 firmware etc. DrayTek Corporation The product contains a cryptographic strength vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2024-41594" }, { "db": "JVNDB", "id": "JVNDB-2024-009984" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2024-41594", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2024-009984", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-009984" }, { "db": "NVD", "id": "CVE-2024-41594" } ] }, "id": "VAR-202410-0179", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.6666667 }, "last_update_date": "2024-10-10T23:21:46.664000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-326", "trust": 1.0 }, { "problemtype": "Inappropriate cryptographic strength (CWE-326) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-009984" }, { "db": "NVD", "id": "CVE-2024-41594" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://www.forescout.com/resources/draybreak-draytek-research/" }, { "trust": 1.0, "url": "https://www.forescout.com/resources/draytek14-vulnerabilities" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2024-41594" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-009984" }, { "db": "NVD", "id": "CVE-2024-41594" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "JVNDB", "id": "JVNDB-2024-009984" }, { "db": "NVD", "id": "CVE-2024-41594" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-10-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2024-009984" }, { "date": "2024-10-03T19:15:04.800000", "db": "NVD", "id": "CVE-2024-41594" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-10-09T01:14:00", "db": "JVNDB", "id": "JVNDB-2024-009984" }, { "date": "2024-10-08T15:31:47.907000", "db": "NVD", "id": "CVE-2024-41594" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0DrayTek\u00a0Corporation\u00a0 Vulnerability related to encryption strength in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-009984" } ], "trust": 0.8 } }
var-202410-0281
Vulnerability from variot
DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow. vigor3912 firmware, vigor2962 firmware, vigor3910 firmware etc. DrayTek Corporation The product contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202410-0281", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "vigor3912", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.3.6.1" }, { "model": "vigor3910", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.3.1" }, { "model": "vigor2866", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.2" }, { "model": "vigor3910", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.3.2.8" }, { "model": "vigor2832", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2860", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2962", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.3.1" }, { "model": "vigor165", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.2.7" }, { "model": "vigor2925", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2763", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.3" }, { "model": "vigor2962", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.3.2.8" }, { "model": "vigor2915", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.3" }, { "model": "vigorlte200", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2926", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor3220", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2135", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.3" }, { "model": "vigor2952", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2762", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2865", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.2" }, { "model": "vigor2962", "scope": "gte", "trust": 1.0, "vendor": "draytek", "version": "4.4.0.0" }, { "model": "vigor2765", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.3" }, { "model": "vigor2620", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2766", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.3" }, { "model": "vigor1000b", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.3.1" }, { "model": "vigor2862", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor3910", "scope": "gte", "trust": 1.0, "vendor": "draytek", "version": "4.4.0.0" }, { "model": "vigor1000b", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.3.2.8" }, { "model": "vigor166", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.2.7" }, { "model": "vigor2133", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor1000b", "scope": "gte", "trust": 1.0, "vendor": "draytek", "version": "4.4.0.0" }, { "model": "vigor2766", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2866", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2765", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2865", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor165", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2962", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor3910", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2133", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2762", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigorlte200", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor1000b", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2915", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor3912", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2620", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2763", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2135", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor166", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-009968" }, { "db": "NVD", "id": "CVE-2024-41593" } ] }, "cve": "CVE-2024-41593", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2024-41593", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2024-41593", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2024-41593", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2024-41593", "trust": 0.8, "value": "Critical" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-009968" }, { "db": "NVD", "id": "CVE-2024-41593" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow. vigor3912 firmware, vigor2962 firmware, vigor3910 firmware etc. DrayTek Corporation The product contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2024-41593" }, { "db": "JVNDB", "id": "JVNDB-2024-009968" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2024-41593", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2024-009968", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-009968" }, { "db": "NVD", "id": "CVE-2024-41593" } ] }, "id": "VAR-202410-0281", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.6666667 }, "last_update_date": "2024-10-13T23:21:57.296000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-009968" }, { "db": "NVD", "id": "CVE-2024-41593" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://www.forescout.com/resources/draybreak-draytek-research/" }, { "trust": 1.0, "url": "https://www.forescout.com/resources/draytek14-vulnerabilities" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2024-41593" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-009968" }, { "db": "NVD", "id": "CVE-2024-41593" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "JVNDB", "id": "JVNDB-2024-009968" }, { "db": "NVD", "id": "CVE-2024-41593" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-10-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2024-009968" }, { "date": "2024-10-03T19:15:04.740000", "db": "NVD", "id": "CVE-2024-41593" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-10-09T00:45:00", "db": "JVNDB", "id": "JVNDB-2024-009968" }, { "date": "2024-10-08T15:35:04.583000", "db": "NVD", "id": "CVE-2024-41593" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0DrayTek\u00a0Corporation\u00a0 Out-of-bounds write vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-009968" } ], "trust": 0.8 } }
var-201909-0723
Vulnerability from variot
On DrayTek Vigor2925 devices with firmware 3.8.4.3, Incorrect Access Control exists in loginset.htm, and can be used to trigger XSS. NOTE: this is an end-of-life product. DrayTek Vigor2925 The device firmware contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. DrayTek Vigor2925 is a wireless firewall router produced by DrayTek, Taiwan. The vulnerability is caused by the lack of correct verification of client data in the WEB application. Attackers can use this vulnerability to execute client code
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201909-0723", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "vigor2925", "scope": "eq", "trust": 2.4, "vendor": "draytek", "version": "3.8.4.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-53296" }, { "db": "JVNDB", "id": "JVNDB-2019-009608" }, { "db": "NVD", "id": "CVE-2019-16533" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:draytek:vigor2925_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-009608" } ] }, "cve": "CVE-2019-16533", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2019-16533", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2020-53296", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-148689", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2019-16533", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2019-16533", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-16533", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-16533", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2020-53296", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201909-993", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-148689", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-53296" }, { "db": "VULHUB", "id": "VHN-148689" }, { "db": "JVNDB", "id": "JVNDB-2019-009608" }, { "db": "CNNVD", "id": "CNNVD-201909-993" }, { "db": "NVD", "id": "CVE-2019-16533" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "On DrayTek Vigor2925 devices with firmware 3.8.4.3, Incorrect Access Control exists in loginset.htm, and can be used to trigger XSS. NOTE: this is an end-of-life product. DrayTek Vigor2925 The device firmware contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. DrayTek Vigor2925 is a wireless firewall router produced by DrayTek, Taiwan. The vulnerability is caused by the lack of correct verification of client data in the WEB application. Attackers can use this vulnerability to execute client code", "sources": [ { "db": "NVD", "id": "CVE-2019-16533" }, { "db": "JVNDB", "id": "JVNDB-2019-009608" }, { "db": "CNVD", "id": "CNVD-2020-53296" }, { "db": "VULHUB", "id": "VHN-148689" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-16533", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2019-009608", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201909-993", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2020-53296", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-148689", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-53296" }, { "db": "VULHUB", "id": "VHN-148689" }, { "db": "JVNDB", "id": "JVNDB-2019-009608" }, { "db": "CNNVD", "id": "CNNVD-201909-993" }, { "db": "NVD", "id": "CVE-2019-16533" } ] }, "id": "VAR-201909-0723", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-53296" }, { "db": "VULHUB", "id": "VHN-148689" } ], "trust": 1.3666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-53296" } ] }, "last_update_date": "2024-11-23T22:16:50.015000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.draytek.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-009608" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-148689" }, { "db": "JVNDB", "id": "JVNDB-2019-009608" }, { "db": "NVD", "id": "CVE-2019-16533" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://www.facebook.com/huang.yuhsiang.phone/posts/1815316691945755" }, { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16533" }, { "trust": 1.7, "url": "https://www.draytek.com/about/security-advisory/urgent-security-updates-to-draytek-routers" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-16533" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-53296" }, { "db": "VULHUB", "id": "VHN-148689" }, { "db": "JVNDB", "id": "JVNDB-2019-009608" }, { "db": "CNNVD", "id": "CNNVD-201909-993" }, { "db": "NVD", "id": "CVE-2019-16533" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-53296" }, { "db": "VULHUB", "id": "VHN-148689" }, { "db": "JVNDB", "id": "JVNDB-2019-009608" }, { "db": "CNNVD", "id": "CNNVD-201909-993" }, { "db": "NVD", "id": "CVE-2019-16533" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-20T00:00:00", "db": "CNVD", "id": "CNVD-2020-53296" }, { "date": "2019-09-20T00:00:00", "db": "VULHUB", "id": "VHN-148689" }, { "date": "2019-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-009608" }, { "date": "2019-09-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-993" }, { "date": "2019-09-20T16:15:13.553000", "db": "NVD", "id": "CVE-2019-16533" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-09-23T00:00:00", "db": "CNVD", "id": "CNVD-2020-53296" }, { "date": "2020-04-06T00:00:00", "db": "VULHUB", "id": "VHN-148689" }, { "date": "2019-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-009608" }, { "date": "2020-04-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-993" }, { "date": "2024-11-21T04:30:46.747000", "db": "NVD", "id": "CVE-2019-16533" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-993" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "DrayTek Vigor2925 Cross-site scripting vulnerability in device firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-009608" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-993" } ], "trust": 0.6 } }
var-201909-0724
Vulnerability from variot
On DrayTek Vigor2925 devices with firmware 3.8.4.3, XSS exists via a crafted WAN name on the General Setup screen. NOTE: this is an end-of-life product. DrayTek Vigor2925 The device firmware contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. DrayTek Vigor2925 is a wireless firewall router from DrayTek, Taiwan. A cross-site scripting vulnerability exists in DrayTek Vigor 2925 with firmware version 3.8.4.3 that could allow an attacker to execute client-side code. The vulnerability stems from the lack of correct validation of client data in WEB applications
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201909-0724", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "vigor2925", "scope": "eq", "trust": 2.4, "vendor": "draytek", "version": "3.8.4.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-33281" }, { "db": "JVNDB", "id": "JVNDB-2019-009609" }, { "db": "NVD", "id": "CVE-2019-16534" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:draytek:vigor2925_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-009609" } ] }, "cve": "CVE-2019-16534", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2019-16534", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-33281", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-148690", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2019-16534", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2019-16534", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-16534", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-16534", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2019-33281", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201909-994", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-148690", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-33281" }, { "db": "VULHUB", "id": "VHN-148690" }, { "db": "JVNDB", "id": "JVNDB-2019-009609" }, { "db": "CNNVD", "id": "CNNVD-201909-994" }, { "db": "NVD", "id": "CVE-2019-16534" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "On DrayTek Vigor2925 devices with firmware 3.8.4.3, XSS exists via a crafted WAN name on the General Setup screen. NOTE: this is an end-of-life product. DrayTek Vigor2925 The device firmware contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. DrayTek Vigor2925 is a wireless firewall router from DrayTek, Taiwan. A cross-site scripting vulnerability exists in DrayTek Vigor 2925 with firmware version 3.8.4.3 that could allow an attacker to execute client-side code. The vulnerability stems from the lack of correct validation of client data in WEB applications", "sources": [ { "db": "NVD", "id": "CVE-2019-16534" }, { "db": "JVNDB", "id": "JVNDB-2019-009609" }, { "db": "CNVD", "id": "CNVD-2019-33281" }, { "db": "VULHUB", "id": "VHN-148690" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-16534", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2019-009609", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201909-994", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2019-33281", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-148690", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-33281" }, { "db": "VULHUB", "id": "VHN-148690" }, { "db": "JVNDB", "id": "JVNDB-2019-009609" }, { "db": "CNNVD", "id": "CNNVD-201909-994" }, { "db": "NVD", "id": "CVE-2019-16534" } ] }, "id": "VAR-201909-0724", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-33281" }, { "db": "VULHUB", "id": "VHN-148690" } ], "trust": 1.3666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-33281" } ] }, "last_update_date": "2024-11-23T22:58:31.438000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.draytek.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-009609" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-148690" }, { "db": "JVNDB", "id": "JVNDB-2019-009609" }, { "db": "NVD", "id": "CVE-2019-16534" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://www.facebook.com/huang.yuhsiang.phone/posts/1815316691945755" }, { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16534" }, { "trust": 1.7, "url": "https://www.draytek.com/about/security-advisory/urgent-security-updates-to-draytek-routers" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-16534" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-33281" }, { "db": "VULHUB", "id": "VHN-148690" }, { "db": "JVNDB", "id": "JVNDB-2019-009609" }, { "db": "CNNVD", "id": "CNNVD-201909-994" }, { "db": "NVD", "id": "CVE-2019-16534" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-33281" }, { "db": "VULHUB", "id": "VHN-148690" }, { "db": "JVNDB", "id": "JVNDB-2019-009609" }, { "db": "CNNVD", "id": "CNNVD-201909-994" }, { "db": "NVD", "id": "CVE-2019-16534" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-09-26T00:00:00", "db": "CNVD", "id": "CNVD-2019-33281" }, { "date": "2019-09-20T00:00:00", "db": "VULHUB", "id": "VHN-148690" }, { "date": "2019-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-009609" }, { "date": "2019-09-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-994" }, { "date": "2019-09-20T16:15:13.617000", "db": "NVD", "id": "CVE-2019-16534" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-09-26T00:00:00", "db": "CNVD", "id": "CNVD-2019-33281" }, { "date": "2020-04-06T00:00:00", "db": "VULHUB", "id": "VHN-148690" }, { "date": "2019-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-009609" }, { "date": "2020-04-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-994" }, { "date": "2024-11-21T04:30:46.890000", "db": "NVD", "id": "CVE-2019-16534" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-994" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "DrayTek Vigor2925 Cross-Site Scripting Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2019-33281" }, { "db": "CNNVD", "id": "CNNVD-201909-994" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-994" } ], "trust": 0.6 } }
var-202410-0186
Vulnerability from variot
DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS. vigor2620 firmware, vigor2915 firmware, vigor2866 firmware etc. DrayTek Corporation A cross-site scripting vulnerability exists in the product.Information may be obtained and information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202410-0186", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "vigor2866", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.2" }, { "model": "vigor3910", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.3.1" }, { "model": "vigor3912", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.3.6.1" }, { "model": "vigor3910", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.3.2.8" }, { "model": "vigor2832", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2860", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2962", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.3.1" }, { "model": "vigor165", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.2.7" }, { "model": "vigor2925", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2763", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.3" }, { "model": "vigor2962", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.3.2.8" }, { "model": "vigor2915", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.3" }, { "model": "vigorlte200", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2926", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor3220", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2135", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.3" }, { "model": "vigor2952", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2762", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2865", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.2" }, { "model": "vigor2962", "scope": "gte", "trust": 1.0, "vendor": "draytek", "version": "4.4.0.0" }, { "model": "vigor2765", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.3" }, { "model": "vigor2620", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor2766", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.5.3" }, { "model": "vigor1000b", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.4.3.1" }, { "model": "vigor2862", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor3910", "scope": "gte", "trust": 1.0, "vendor": "draytek", "version": "4.4.0.0" }, { "model": "vigor166", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.2.7" }, { "model": "vigor1000b", "scope": "lt", "trust": 1.0, "vendor": "draytek", "version": "4.3.2.8" }, { "model": "vigor2133", "scope": "eq", "trust": 1.0, "vendor": "draytek", "version": "*" }, { "model": "vigor1000b", "scope": "gte", "trust": 1.0, "vendor": "draytek", "version": "4.4.0.0" }, { "model": "vigor2766", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2866", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2765", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2865", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor165", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2962", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor3910", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2133", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2762", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigorlte200", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor1000b", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2915", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor3912", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2620", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2763", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor2135", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null }, { "model": "vigor166", "scope": null, "trust": 0.8, "vendor": "draytek", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-009985" }, { "db": "NVD", "id": "CVE-2024-41591" } ] }, "cve": "CVE-2024-41591", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2024-41591", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2024-41591", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2024-41591", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2024-41591", "trust": 0.8, "value": "Medium" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-009985" }, { "db": "NVD", "id": "CVE-2024-41591" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS. vigor2620 firmware, vigor2915 firmware, vigor2866 firmware etc. DrayTek Corporation A cross-site scripting vulnerability exists in the product.Information may be obtained and information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2024-41591" }, { "db": "JVNDB", "id": "JVNDB-2024-009985" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2024-41591", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2024-009985", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-009985" }, { "db": "NVD", "id": "CVE-2024-41591" } ] }, "id": "VAR-202410-0186", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.6666667 }, "last_update_date": "2024-10-11T23:01:21.952000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.0 }, { "problemtype": "Cross-site scripting (CWE-79) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-009985" }, { "db": "NVD", "id": "CVE-2024-41591" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://www.forescout.com/resources/draybreak-draytek-research/" }, { "trust": 1.0, "url": "https://www.forescout.com/resources/draytek14-vulnerabilities" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2024-41591" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-009985" }, { "db": "NVD", "id": "CVE-2024-41591" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "JVNDB", "id": "JVNDB-2024-009985" }, { "db": "NVD", "id": "CVE-2024-41591" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-10-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2024-009985" }, { "date": "2024-10-03T19:15:04.560000", "db": "NVD", "id": "CVE-2024-41591" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-10-09T01:14:00", "db": "JVNDB", "id": "JVNDB-2024-009985" }, { "date": "2024-10-08T15:34:46.453000", "db": "NVD", "id": "CVE-2024-41591" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0DrayTek\u00a0Corporation\u00a0 Cross-site scripting vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-009985" } ], "trust": 0.8 } }
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.forescout.com/resources/draybreak-draytek-research/ | Mitigation, Technical Description, Third Party Advisory | |
cve@mitre.org | https://www.forescout.com/resources/draytek14-vulnerabilities | Broken Link |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84670562-F228-40A0-A38D-144EA62556D3", "versionEndExcluding": "4.3.6.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*", "matchCriteriaId": "282E5318-DAA8-4AA2-8E7D-4B8BD9162153", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0549C870-BE10-441A-B07D-0701915E5A9E", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D1A9825-E419-4740-996A-5928D207FCB6", "versionEndExcluding": "4.4.3.1", "versionStartIncluding": "4.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B937F11C-FC86-4D6E-A46B-BA2CA0FFCEF7", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2602941C-255F-4289-9043-D396CC4B3192", "versionEndExcluding": "4.4.3.1", "versionStartIncluding": "4.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*", "matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59521C99-00BA-4503-823E-3FEA44F8DDA0", "versionEndExcluding": "4.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDBC681E-CD03-49E5-BC3A-E4A7654975A3", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABDC93B5-DC0A-4AA4-A340-382F108AE80B", "versionEndExcluding": "4.4.3.1", "versionStartIncluding": "4.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FF86645-253A-4BA3-BA2A-2725575C390D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B9436B-B2FE-4644-BB06-B0537EC23A71", "versionEndExcluding": "4.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4AB3320-27F8-4359-AEF8-6B1FDBA67111", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A559F44-80F8-44B7-B70F-BA0B78C85283", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EA9DF5D-6651-455A-9305-C42C0FF51F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B1826F9-0258-44DD-A471-113CF55CE563", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*", "matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3D46DEC-06AB-489F-A0B5-10C31F80A8C1", "versionEndExcluding": "4.4.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*", "matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F87D851-15BC-4FC1-8AB7-D5C15B2B74F0", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89461FD4-897D-44F1-8486-4BCCDE3772DD", "versionEndExcluding": "4.4.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6E55BCE-BBF0-454B-AE86-45B7298888B3", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:*", "matchCriteriaId": "5860CBE4-328E-418D-9E81-1D3AF7DB8F2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289E3E0B-6BA4-44B8-968A-AC374B15B631", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D98663B-F2F5-4ADC-9FD5-75846890EEBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1BD8E59-6C67-4C80-B25F-2C5814A8CF0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43265128-7E8E-4FE2-8488-AC5734A4AF70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*", "matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52F71B18-89B5-42C7-B4B7-448844D6AFBC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*", "matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A96F64C0-09DD-4553-AC5F-D722B8321B0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2C4077B-C73F-4431-9103-C09960E203E1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*", "matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D081E5D-7A68-47A0-9EFE-1FC01DA2FF23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C470B04-BD57-429B-80FC-328A7D2E35E5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*", "matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A688631-4B36-43CC-AEF8-D390081F01DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E207BB52-29F8-4F2F-AA06-855B38E22958", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*", "matchCriteriaId": "167336E2-AAA8-4424-AB07-2D7C9E1542B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD8437FD-65E2-4203-82B9-8FC32444204A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*", "matchCriteriaId": "64955940-3998-4B76-92D1-D9F3FAB874B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow." }, { "lang": "es", "value": "Los dispositivos DrayTek Vigor310 hasta 4.3.2.6 permiten a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n ft_payload_dns(), porque se produce una operaci\u00f3n de extensi\u00f3n de signo de byte para el argumento de longitud de una llamada _memcpy, lo que lleva a un desbordamiento de b\u00fafer basado en el mont\u00f3n." } ], "id": "CVE-2024-41593", "lastModified": "2025-03-13T19:15:47.260", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-10-03T19:15:04.740", "references": [ { "source": "cve@mitre.org", "tags": [ "Mitigation", "Technical Description", "Third Party Advisory" ], "url": "https://www.forescout.com/resources/draybreak-draytek-research/" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://www.forescout.com/resources/draytek14-vulnerabilities" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://draytek.com | Product | |
cve@mitre.org | https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59521C99-00BA-4503-823E-3FEA44F8DDA0", "versionEndExcluding": "4.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B9436B-B2FE-4644-BB06-B0537EC23A71", "versionEndExcluding": "4.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C7DD492-4294-484D-A4D2-BCCCA152D57F", "versionEndExcluding": "3.9.8.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D98663B-F2F5-4ADC-9FD5-75846890EEBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7845410-6E90-4E92-8029-964A7F77EC57", "versionEndExcluding": "3.9.8.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02588C38-E98C-4553-93C0-535A0C129783", "versionEndExcluding": "3.9.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*", "matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43C713BB-02A0-4CD4-A27F-943D5D538444", "versionEndExcluding": "3.9.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*", "matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "765C62A0-BE3E-4661-8FD6-E9566B7C3C28", "versionEndExcluding": "3.9.9.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "36FE9F0A-223F-42DC-BCB6-4A7A24A65130", "versionEndExcluding": "3.9.9.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0813DB7-4B52-40E1-9D5C-DBF9FA74EFD0", "versionEndExcluding": "3.9.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*", "matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B69D1EC-7C33-4367-80BA-4008E8C9A4BE", "versionEndExcluding": "3.9.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*", "matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D46E5FF5-6521-4A10-8CC5-34518A38ECFA", "versionEndExcluding": "3.9.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FD4B17C-2E8A-45C9-8475-C5FD40C86052", "versionEndExcluding": "4.4.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "815465FB-9BDB-4A16-9E8A-A73B928A7999", "versionEndExcluding": "4.4.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*", "matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73E966A8-E862-4118-B178-93C297765B0B", "versionEndExcluding": "4.4.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "31F174D4-CDE6-401D-9040-34B862BDE1F9", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*", "matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9B2CD77-C72F-4C26-B082-EA2671A59116", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2927_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "570A3205-4E89-47E5-9FAE-2D4FFBD5A667", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2927:-:*:*:*:*:*:*:*", "matchCriteriaId": "12460F51-25AB-4EA9-BC43-9CE8DA992D75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0549C870-BE10-441A-B07D-0701915E5A9E", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:4.4.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "69EE76E5-A910-46D0-AF34-28D28B77E024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B937F11C-FC86-4D6E-A46B-BA2CA0FFCEF7", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:4.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "E857D42C-1967-46FE-94F6-45B3008ED4DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*", "matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84670562-F228-40A0-A38D-144EA62556D3", "versionEndExcluding": "4.3.6.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*", "matchCriteriaId": "282E5318-DAA8-4AA2-8E7D-4B8BD9162153", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 allows attackers to upload crafted APP Enforcement modules, leading to arbitrary code execution." }, { "lang": "es", "value": "Un problema en los dispositivos Draytek Vigor 165/166 anteriores a la v4.2.6, Vigor 2620/LTE200 anteriores a la v3.9.8.8, Vigor 2860/2925 anteriores a la v3.9.7, Vigor 2862/2926 anteriores a la v3.9.9.4, Vigor 2133/2762/2832 anteriores a la v3.9.8, Vigor 2135/2765/2766 anteriores a la v4.4.5.1, Vigor 2865/2866/2927 anteriores a la v4.4.5.3, Vigor 2962/3910 anteriores a la v4.3.2.7, Vigor 3912 anteriores a la v4.3.5.2 y Vigor 2925 hasta la v3.9.6 permite a los atacantes cargar aplicaciones manipuladas por ellos. M\u00f3dulos de cumplimiento que conducen a la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "id": "CVE-2024-41340", "lastModified": "2025-06-03T13:52:23.300", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-02-27T21:15:36.923", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://draytek.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://draytek.com | Product | |
cve@mitre.org | https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5485DD5C-12A3-4289-8196-43FFB3DF8B06", "versionEndExcluding": "3.9.9.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D98663B-F2F5-4ADC-9FD5-75846890EEBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "80EC4363-A351-4117-96CE-1F8B4748FCAC", "versionEndExcluding": "3.9.9.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "519DD534-4B4A-48A4-9C5D-FB197DC5C777", "versionEndExcluding": "3.9.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*", "matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFCA64D1-9731-4990-AD61-F673D41716BE", "versionEndExcluding": "3.9.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*", "matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2821747D-FDE2-47FA-B352-70F6FBE0473D", "versionEndExcluding": "3.9.9.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ADD3195E-BA40-40B3-AF13-64AFF4890EE4", "versionEndExcluding": "3.9.9.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F53804E7-59F0-4328-A732-9A14EB076E87", "versionEndExcluding": "3.9.9.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*", "matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42C4DE6D-EE26-4445-8F57-0DCEC311A6A2", "versionEndExcluding": "3.9.9.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*", "matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC78800A-438E-4B67-B3A5-F18D10F5D9B5", "versionEndExcluding": "3.9.9.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CBCFE34-3027-4DBB-9214-4CC891865F25", "versionEndExcluding": "4.4.5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "162BD269-E656-4A91-9E8C-A5E26A646B2D", "versionEndExcluding": "4.4.5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*", "matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9695AA4E-EC4A-4F02-BFCD-5308CBE19510", "versionEndExcluding": "4.4.5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7ECD7087-34D5-4841-97D1-B9F361327016", "versionEndExcluding": "4.4.5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EA9DF5D-6651-455A-9305-C42C0FF51F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45D6CD9B-5252-4541-9745-3F4E4D0C5C82", "versionEndExcluding": "4.4.5.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*", "matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F40A5ACD-BC60-4C97-BF7D-6B609A1D99E6", "versionEndExcluding": "4.4.5.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2927_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "74715D2C-FDF6-4882-A57A-327014FCC1CB", "versionEndExcluding": "4.4.5.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2927:-:*:*:*:*:*:*:*", "matchCriteriaId": "12460F51-25AB-4EA9-BC43-9CE8DA992D75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "093FCEE3-FEAA-4DA5-AD20-206D3822C63F", "versionEndExcluding": "4.3.2.9", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "94AD7401-FE5B-4E5F-9469-DEDB101C6990", "versionEndExcluding": "4.4.3.2", "versionStartIncluding": "4.4.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "529BDB13-03F3-4EF4-A15C-4EF2467DF5AE", "versionEndExcluding": "4.3.2.9", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F18DFF3-93B4-462C-908E-99C243EFFA2F", "versionEndExcluding": "4.4.3.2", "versionStartIncluding": "4.4.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*", "matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AD4EA0F-391C-4A2E-B5CD-0D0689C36F20", "versionEndExcluding": "4.4.3.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*", "matchCriteriaId": "282E5318-DAA8-4AA2-8E7D-4B8BD9162153", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A876E867-03E8-470E-A830-C0C5FBCCB257", "versionEndExcluding": "4.4.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:*", "matchCriteriaId": "5860CBE4-328E-418D-9E81-1D3AF7DB8F2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B75C80CA-401A-4228-98F9-D27E529DC32D", "versionEndExcluding": "4.4.3.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FF86645-253A-4BA3-BA2A-2725575C390D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F39C5A58-E6F1-4BA5-B321-7EA78F8DC7A6", "versionEndExcluding": "3.9.8.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*", "matchCriteriaId": "167336E2-AAA8-4424-AB07-2D7C9E1542B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85DA10A6-CA24-4D03-B4DC-CC9A33D7E22D", "versionEndExcluding": "3.9.8.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*", "matchCriteriaId": "64955940-3998-4B76-92D1-D9F3FAB874B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerability in Vigor2620/LTE200 3.9.8.9 and earlier and Vigor2860/2925 3.9.8 and earlier and Vigor2862/2926 3.9.9.5 and earlier and Vigor2133/2762/2832 3.9.9 and earlier and Vigor165/166 4.2.7 and earlier and Vigor2135/2765/2766 4.4.5.1 and earlier and Vigor2865/2866/2927 4.4.5.3 and earlier and Vigor2962/3910 4.3.2.8/4.4.3.1 and earlier and Vigor3912 4.3.6.1 and earlier allows a remote attacker to execute arbitrary code via the CGI parser\u0027s handling of the \"Content-Length\" header of HTTP POST requests." }, { "lang": "es", "value": "Buffer Overflow vulnerability in Vigor2620/LTE200 3.9.8.9 and earlier and Vigor2860/2925 3.9.8 and earlier and Vigor2862/2926 3.9.9.5 and earlier and Vigor2133/2762/2832 3.9.9 and earlier and Vigor165/166 4.2.7 and earlier and Vigor2135/2765/2766 4.4.5.1 and earlier and Vigor2865/2866/2927 4.4.5.3 and earlier and Vigor2962/3910 4.3.2.8/4.4.3.1 and earlier and Vigor3912 4.3.6.1 and earlier allows a remote attacker to execute arbitrary code via the CGI parser\u0027s handling of the \"Content-Length\" header of HTTP POST requests." } ], "id": "CVE-2024-51139", "lastModified": "2025-05-28T16:23:26.310", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-02-27T21:15:37.123", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://draytek.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://draytek.com | Product | |
cve@mitre.org | https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59521C99-00BA-4503-823E-3FEA44F8DDA0", "versionEndExcluding": "4.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B9436B-B2FE-4644-BB06-B0537EC23A71", "versionEndExcluding": "4.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C7DD492-4294-484D-A4D2-BCCCA152D57F", "versionEndExcluding": "3.9.8.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D98663B-F2F5-4ADC-9FD5-75846890EEBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7845410-6E90-4E92-8029-964A7F77EC57", "versionEndExcluding": "3.9.8.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02588C38-E98C-4553-93C0-535A0C129783", "versionEndExcluding": "3.9.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*", "matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43C713BB-02A0-4CD4-A27F-943D5D538444", "versionEndExcluding": "3.9.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*", "matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "765C62A0-BE3E-4661-8FD6-E9566B7C3C28", "versionEndExcluding": "3.9.9.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "36FE9F0A-223F-42DC-BCB6-4A7A24A65130", "versionEndExcluding": "3.9.9.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0813DB7-4B52-40E1-9D5C-DBF9FA74EFD0", "versionEndExcluding": "3.9.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*", "matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B69D1EC-7C33-4367-80BA-4008E8C9A4BE", "versionEndExcluding": "3.9.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*", "matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D46E5FF5-6521-4A10-8CC5-34518A38ECFA", "versionEndExcluding": "3.9.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FD4B17C-2E8A-45C9-8475-C5FD40C86052", "versionEndExcluding": "4.4.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "815465FB-9BDB-4A16-9E8A-A73B928A7999", "versionEndExcluding": "4.4.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*", "matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73E966A8-E862-4118-B178-93C297765B0B", "versionEndExcluding": "4.4.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "31F174D4-CDE6-401D-9040-34B862BDE1F9", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*", "matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9B2CD77-C72F-4C26-B082-EA2671A59116", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2927_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "570A3205-4E89-47E5-9FAE-2D4FFBD5A667", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2927:-:*:*:*:*:*:*:*", "matchCriteriaId": "12460F51-25AB-4EA9-BC43-9CE8DA992D75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0549C870-BE10-441A-B07D-0701915E5A9E", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:4.4.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "69EE76E5-A910-46D0-AF34-28D28B77E024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B937F11C-FC86-4D6E-A46B-BA2CA0FFCEF7", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:4.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "E857D42C-1967-46FE-94F6-45B3008ED4DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*", "matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84670562-F228-40A0-A38D-144EA62556D3", "versionEndExcluding": "4.3.6.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*", "matchCriteriaId": "282E5318-DAA8-4AA2-8E7D-4B8BD9162153", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the CGI endpoint used to upload configurations in Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 allows attackers to upload a crafted kernel module, allowing for arbitrary code execution." }, { "lang": "es", "value": "Un problema en el endpoint CGI utilizado para cargar configuraciones en dispositivos Draytek Vigor 165/166 anterior a v4.2.6, Vigor 2620/LTE200 anterior a v3.9.8.8, Vigor 2860/2925 anterior a v3.9.7, Vigor 2862/2926 anterior a v3.9.9.4, Vigor 2133/2762/2832 anterior a v3.9.8, Vigor 2135/2765/2766 anterior a v4.4.5.1, Vigor 2865/2866/2927 anterior a v4.4.5.3, Vigor 2962/3910 anterior a v4.3.2.7, Vigor 3912 anterior a v4.3.5.2 y Vigor 2925 hasta v3.9.6 permite a los atacantes cargar un m\u00f3dulo de kernel manipulado espec\u00edficamente, lo que permite la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "id": "CVE-2024-41339", "lastModified": "2025-06-03T13:52:39.957", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-02-27T21:15:36.837", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://draytek.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.forescout.com/resources/draybreak-draytek-research/ | Mitigation, Technical Description, Third Party Advisory | |
cve@mitre.org | https://www.forescout.com/resources/draytek14-vulnerabilities | Broken Link |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289E3E0B-6BA4-44B8-968A-AC374B15B631", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D98663B-F2F5-4ADC-9FD5-75846890EEBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6E55BCE-BBF0-454B-AE86-45B7298888B3", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:*", "matchCriteriaId": "5860CBE4-328E-418D-9E81-1D3AF7DB8F2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89461FD4-897D-44F1-8486-4BCCDE3772DD", "versionEndExcluding": "4.4.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F87D851-15BC-4FC1-8AB7-D5C15B2B74F0", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3D46DEC-06AB-489F-A0B5-10C31F80A8C1", "versionEndExcluding": "4.4.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*", "matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B1826F9-0258-44DD-A471-113CF55CE563", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*", "matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A559F44-80F8-44B7-B70F-BA0B78C85283", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EA9DF5D-6651-455A-9305-C42C0FF51F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4AB3320-27F8-4359-AEF8-6B1FDBA67111", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B9436B-B2FE-4644-BB06-B0537EC23A71", "versionEndExcluding": "4.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84670562-F228-40A0-A38D-144EA62556D3", "versionEndExcluding": "4.3.6.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*", "matchCriteriaId": "282E5318-DAA8-4AA2-8E7D-4B8BD9162153", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDBC681E-CD03-49E5-BC3A-E4A7654975A3", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABDC93B5-DC0A-4AA4-A340-382F108AE80B", "versionEndExcluding": "4.4.3.1", "versionStartIncluding": "4.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FF86645-253A-4BA3-BA2A-2725575C390D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59521C99-00BA-4503-823E-3FEA44F8DDA0", "versionEndExcluding": "4.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B937F11C-FC86-4D6E-A46B-BA2CA0FFCEF7", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2602941C-255F-4289-9043-D396CC4B3192", "versionEndExcluding": "4.4.3.1", "versionStartIncluding": "4.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*", "matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0549C870-BE10-441A-B07D-0701915E5A9E", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D1A9825-E419-4740-996A-5928D207FCB6", "versionEndExcluding": "4.4.3.1", "versionStartIncluding": "4.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1BD8E59-6C67-4C80-B25F-2C5814A8CF0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43265128-7E8E-4FE2-8488-AC5734A4AF70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*", "matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52F71B18-89B5-42C7-B4B7-448844D6AFBC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*", "matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A96F64C0-09DD-4553-AC5F-D722B8321B0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2C4077B-C73F-4431-9103-C09960E203E1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*", "matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D081E5D-7A68-47A0-9EFE-1FC01DA2FF23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C470B04-BD57-429B-80FC-328A7D2E35E5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*", "matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A688631-4B36-43CC-AEF8-D390081F01DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E207BB52-29F8-4F2F-AA06-855B38E22958", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*", "matchCriteriaId": "167336E2-AAA8-4424-AB07-2D7C9E1542B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD8437FD-65E2-4203-82B9-8FC32444204A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*", "matchCriteriaId": "64955940-3998-4B76-92D1-D9F3FAB874B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The CGI endpoints v2x00.cgi and cgiwcg.cgi of DrayTek Vigor3910 devices through 4.3.2.6 are vulnerable to buffer overflows, by authenticated users, because of missing bounds checking on parameters passed through POST requests to the strncpy function." }, { "lang": "es", "value": "Los endpoints CGI v2x00.cgi y cgiwcg.cgi de los dispositivos DrayTek Vigor3910 hasta 4.3.2.6 son vulnerables a desbordamientos de b\u00fafer, por parte de usuarios autenticados, debido a la falta de verificaci\u00f3n de los l\u00edmites en los par\u00e1metros pasados a trav\u00e9s de solicitudes POST a la funci\u00f3n strncpy." } ], "id": "CVE-2024-41588", "lastModified": "2025-06-11T13:54:06.133", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-10-03T19:15:04.363", "references": [ { "source": "cve@mitre.org", "tags": [ "Mitigation", "Technical Description", "Third Party Advisory" ], "url": "https://www.forescout.com/resources/draybreak-draytek-research/" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://www.forescout.com/resources/draytek14-vulnerabilities" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.forescout.com/resources/draybreak-draytek-research/ | Mitigation, Technical Description, Third Party Advisory | |
cve@mitre.org | https://www.forescout.com/resources/draytek14-vulnerabilities | Broken Link |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289E3E0B-6BA4-44B8-968A-AC374B15B631", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D98663B-F2F5-4ADC-9FD5-75846890EEBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6E55BCE-BBF0-454B-AE86-45B7298888B3", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:*", "matchCriteriaId": "5860CBE4-328E-418D-9E81-1D3AF7DB8F2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89461FD4-897D-44F1-8486-4BCCDE3772DD", "versionEndExcluding": "4.4.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F87D851-15BC-4FC1-8AB7-D5C15B2B74F0", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3D46DEC-06AB-489F-A0B5-10C31F80A8C1", "versionEndExcluding": "4.4.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*", "matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B1826F9-0258-44DD-A471-113CF55CE563", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*", "matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A559F44-80F8-44B7-B70F-BA0B78C85283", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EA9DF5D-6651-455A-9305-C42C0FF51F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4AB3320-27F8-4359-AEF8-6B1FDBA67111", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B9436B-B2FE-4644-BB06-B0537EC23A71", "versionEndExcluding": "4.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDBC681E-CD03-49E5-BC3A-E4A7654975A3", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABDC93B5-DC0A-4AA4-A340-382F108AE80B", "versionEndExcluding": "4.4.3.1", "versionStartIncluding": "4.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FF86645-253A-4BA3-BA2A-2725575C390D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59521C99-00BA-4503-823E-3FEA44F8DDA0", "versionEndExcluding": "4.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B937F11C-FC86-4D6E-A46B-BA2CA0FFCEF7", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2602941C-255F-4289-9043-D396CC4B3192", "versionEndExcluding": "4.4.3.1", "versionStartIncluding": "4.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*", "matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0549C870-BE10-441A-B07D-0701915E5A9E", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D1A9825-E419-4740-996A-5928D207FCB6", "versionEndExcluding": "4.4.3.1", "versionStartIncluding": "4.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84670562-F228-40A0-A38D-144EA62556D3", "versionEndExcluding": "4.3.6.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*", "matchCriteriaId": "282E5318-DAA8-4AA2-8E7D-4B8BD9162153", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1BD8E59-6C67-4C80-B25F-2C5814A8CF0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43265128-7E8E-4FE2-8488-AC5734A4AF70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*", "matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52F71B18-89B5-42C7-B4B7-448844D6AFBC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*", "matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A96F64C0-09DD-4553-AC5F-D722B8321B0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2C4077B-C73F-4431-9103-C09960E203E1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*", "matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D081E5D-7A68-47A0-9EFE-1FC01DA2FF23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C470B04-BD57-429B-80FC-328A7D2E35E5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*", "matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A688631-4B36-43CC-AEF8-D390081F01DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E207BB52-29F8-4F2F-AA06-855B38E22958", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*", "matchCriteriaId": "167336E2-AAA8-4424-AB07-2D7C9E1542B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD8437FD-65E2-4203-82B9-8FC32444204A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*", "matchCriteriaId": "64955940-3998-4B76-92D1-D9F3FAB874B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in DrayTek Vigor310 devices through 4.3.2.6 allows an attacker to obtain sensitive information because the httpd server of the Vigor management UI uses a static string for seeding the PRNG of OpenSSL." }, { "lang": "es", "value": "Un problema en los dispositivos DrayTek Vigor310 hasta la versi\u00f3n 4.3.2.6 permite a un atacante obtener informaci\u00f3n confidencial porque el servidor httpd de la interfaz de administraci\u00f3n de Vigor utiliza una cadena est\u00e1tica para inicializar el PRNG de OpenSSL." } ], "id": "CVE-2024-41594", "lastModified": "2025-03-19T16:15:26.387", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-10-03T19:15:04.800", "references": [ { "source": "cve@mitre.org", "tags": [ "Mitigation", "Technical Description", "Third Party Advisory" ], "url": "https://www.forescout.com/resources/draybreak-draytek-research/" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://www.forescout.com/resources/draytek14-vulnerabilities" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-326" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-326" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.forescout.com/resources/draybreak-draytek-research/ | Mitigation, Technical Description, Third Party Advisory | |
cve@mitre.org | https://www.forescout.com/resources/draytek14-vulnerabilities | Broken Link |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B1826F9-0258-44DD-A471-113CF55CE563", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*", "matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A559F44-80F8-44B7-B70F-BA0B78C85283", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EA9DF5D-6651-455A-9305-C42C0FF51F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4AB3320-27F8-4359-AEF8-6B1FDBA67111", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B9436B-B2FE-4644-BB06-B0537EC23A71", "versionEndExcluding": "4.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84670562-F228-40A0-A38D-144EA62556D3", "versionEndExcluding": "4.3.6.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*", "matchCriteriaId": "282E5318-DAA8-4AA2-8E7D-4B8BD9162153", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDBC681E-CD03-49E5-BC3A-E4A7654975A3", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABDC93B5-DC0A-4AA4-A340-382F108AE80B", "versionEndExcluding": "4.4.3.1", "versionStartIncluding": "4.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FF86645-253A-4BA3-BA2A-2725575C390D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59521C99-00BA-4503-823E-3FEA44F8DDA0", "versionEndExcluding": "4.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B937F11C-FC86-4D6E-A46B-BA2CA0FFCEF7", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2602941C-255F-4289-9043-D396CC4B3192", "versionEndExcluding": "4.4.3.1", "versionStartIncluding": "4.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*", "matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0549C870-BE10-441A-B07D-0701915E5A9E", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D1A9825-E419-4740-996A-5928D207FCB6", "versionEndExcluding": "4.4.3.1", "versionStartIncluding": "4.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1BD8E59-6C67-4C80-B25F-2C5814A8CF0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43265128-7E8E-4FE2-8488-AC5734A4AF70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*", "matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52F71B18-89B5-42C7-B4B7-448844D6AFBC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*", "matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A96F64C0-09DD-4553-AC5F-D722B8321B0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2C4077B-C73F-4431-9103-C09960E203E1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*", "matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D081E5D-7A68-47A0-9EFE-1FC01DA2FF23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C470B04-BD57-429B-80FC-328A7D2E35E5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*", "matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A688631-4B36-43CC-AEF8-D390081F01DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E207BB52-29F8-4F2F-AA06-855B38E22958", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*", "matchCriteriaId": "167336E2-AAA8-4424-AB07-2D7C9E1542B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD8437FD-65E2-4203-82B9-8FC32444204A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*", "matchCriteriaId": "64955940-3998-4B76-92D1-D9F3FAB874B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289E3E0B-6BA4-44B8-968A-AC374B15B631", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D98663B-F2F5-4ADC-9FD5-75846890EEBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6E55BCE-BBF0-454B-AE86-45B7298888B3", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:*", "matchCriteriaId": "5860CBE4-328E-418D-9E81-1D3AF7DB8F2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89461FD4-897D-44F1-8486-4BCCDE3772DD", "versionEndExcluding": "4.4.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F87D851-15BC-4FC1-8AB7-D5C15B2B74F0", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3D46DEC-06AB-489F-A0B5-10C31F80A8C1", "versionEndExcluding": "4.4.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*", "matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Several CGI endpoints are vulnerable to buffer overflows, by authenticated users, because of missing bounds checking on parameters passed through POST requests to the strcpy function on DrayTek Vigor310 devices through 4.3.2.6." }, { "lang": "es", "value": "Varios endpoints de CGI son vulnerables a desbordamientos de b\u00fafer, por parte de usuarios autenticados, debido a la falta de verificaci\u00f3n de los l\u00edmites en los par\u00e1metros pasados a trav\u00e9s de solicitudes POST a la funci\u00f3n strcpy en dispositivos DrayTek Vigor310 hasta 4.3.2.6." } ], "id": "CVE-2024-41590", "lastModified": "2025-06-11T13:49:57.290", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-10-03T19:15:04.487", "references": [ { "source": "cve@mitre.org", "tags": [ "Mitigation", "Technical Description", "Third Party Advisory" ], "url": "https://www.forescout.com/resources/draybreak-draytek-research/" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://www.forescout.com/resources/draytek14-vulnerabilities" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://draytek.com | Product | |
cve@mitre.org | https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AD4EA0F-391C-4A2E-B5CD-0D0689C36F20", "versionEndExcluding": "4.4.3.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*", "matchCriteriaId": "282E5318-DAA8-4AA2-8E7D-4B8BD9162153", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5485DD5C-12A3-4289-8196-43FFB3DF8B06", "versionEndExcluding": "3.9.9.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D98663B-F2F5-4ADC-9FD5-75846890EEBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "80EC4363-A351-4117-96CE-1F8B4748FCAC", "versionEndExcluding": "3.9.9.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "519DD534-4B4A-48A4-9C5D-FB197DC5C777", "versionEndExcluding": "3.9.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*", "matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFCA64D1-9731-4990-AD61-F673D41716BE", "versionEndExcluding": "3.9.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*", "matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2821747D-FDE2-47FA-B352-70F6FBE0473D", "versionEndExcluding": "3.9.9.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ADD3195E-BA40-40B3-AF13-64AFF4890EE4", "versionEndExcluding": "3.9.9.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F53804E7-59F0-4328-A732-9A14EB076E87", "versionEndExcluding": "3.9.9.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*", "matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42C4DE6D-EE26-4445-8F57-0DCEC311A6A2", "versionEndExcluding": "3.9.9.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*", "matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC78800A-438E-4B67-B3A5-F18D10F5D9B5", "versionEndExcluding": "3.9.9.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CBCFE34-3027-4DBB-9214-4CC891865F25", "versionEndExcluding": "4.4.5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "162BD269-E656-4A91-9E8C-A5E26A646B2D", "versionEndExcluding": "4.4.5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*", "matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9695AA4E-EC4A-4F02-BFCD-5308CBE19510", "versionEndExcluding": "4.4.5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7ECD7087-34D5-4841-97D1-B9F361327016", "versionEndExcluding": "4.4.5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EA9DF5D-6651-455A-9305-C42C0FF51F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45D6CD9B-5252-4541-9745-3F4E4D0C5C82", "versionEndExcluding": "4.4.5.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*", "matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F40A5ACD-BC60-4C97-BF7D-6B609A1D99E6", "versionEndExcluding": "4.4.5.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2927_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "74715D2C-FDF6-4882-A57A-327014FCC1CB", "versionEndExcluding": "4.4.5.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2927:-:*:*:*:*:*:*:*", "matchCriteriaId": "12460F51-25AB-4EA9-BC43-9CE8DA992D75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "093FCEE3-FEAA-4DA5-AD20-206D3822C63F", "versionEndExcluding": "4.3.2.9", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "94AD7401-FE5B-4E5F-9469-DEDB101C6990", "versionEndExcluding": "4.4.3.2", "versionStartIncluding": "4.4.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "529BDB13-03F3-4EF4-A15C-4EF2467DF5AE", "versionEndExcluding": "4.3.2.9", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F18DFF3-93B4-462C-908E-99C243EFFA2F", "versionEndExcluding": "4.4.3.2", "versionStartIncluding": "4.4.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*", "matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A876E867-03E8-470E-A830-C0C5FBCCB257", "versionEndExcluding": "4.4.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:*", "matchCriteriaId": "5860CBE4-328E-418D-9E81-1D3AF7DB8F2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B75C80CA-401A-4228-98F9-D27E529DC32D", "versionEndExcluding": "4.4.3.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FF86645-253A-4BA3-BA2A-2725575C390D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F39C5A58-E6F1-4BA5-B321-7EA78F8DC7A6", "versionEndExcluding": "3.9.8.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*", "matchCriteriaId": "167336E2-AAA8-4424-AB07-2D7C9E1542B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85DA10A6-CA24-4D03-B4DC-CC9A33D7E22D", "versionEndExcluding": "3.9.8.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*", "matchCriteriaId": "64955940-3998-4B76-92D1-D9F3FAB874B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vigor165/166 4.2.7 and earlier; Vigor2620/LTE200 3.9.8.9 and earlier; Vigor2860/2925 3.9.8 and earlier; Vigor2862/2926 3.9.9.5 and earlier; Vigor2133/2762/2832 3.9.9 and earlier; Vigor2135/2765/2766 4.4.5. and earlier; Vigor2865/2866/2927 4.4.5.3 and earlier; Vigor2962 4.3.2.8 and earlier; Vigor3912 4.3.6.1 and earlier; Vigor3910 4.4.3.1 and earlier a stack-based buffer overflow vulnerability has been identified in the URL parsing functionality of the TR069 STUN server. This flaw occurs due to insufficient bounds checking on the amount of URL parameters, allowing an attacker to exploit the overflow by sending a maliciously crafted request. Consequently, a remote attacker can execute arbitrary code with elevated privileges." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad de desbordamiento de b\u00fafer basada en pila en la funcionalidad de an\u00e1lisis de URL del servidor STUN TR069. Vigor165/166 4.2.7 y anteriores; Vigor2620/LTE200 3.9.8.9 y anteriores; Vigor2860/2925 3.9.8 y anteriores; Vigor2862/2926 3.9.9.5 y anteriores; Vigor2133/2762/2832 3.9.9 y anteriores; Vigor2135/2765/2766 4.4.5. y anteriores; Vigor2865/2866/2927 4.4.5.3 y anteriores; Vigor2962 4.3.2.8 y anteriores; Vigor3912 4.3.6.1 y anteriores; Vigor3910 4.4.3.1 y anteriores se ha identificado una vulnerabilidad de desbordamiento de b\u00fafer basada en pila en la funcionalidad de an\u00e1lisis de URL del servidor STUN TR069. Esta falla se produce debido a una verificaci\u00f3n insuficiente de los l\u00edmites de la cantidad de par\u00e1metros de URL, lo que permite a un atacante aprovechar el desbordamiento mediante el env\u00edo de una solicitud manipulada con fines malintencionados. En consecuencia, un atacante remoto puede ejecutar c\u00f3digo arbitrario con privilegios elevados." } ], "id": "CVE-2024-51138", "lastModified": "2025-05-28T16:41:26.460", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-02-27T21:15:37.023", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://draytek.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.forescout.com/resources/draybreak-draytek-research/ | Mitigation, Technical Description, Third Party Advisory | |
cve@mitre.org | https://www.forescout.com/resources/draytek14-vulnerabilities | Broken Link |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289E3E0B-6BA4-44B8-968A-AC374B15B631", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D98663B-F2F5-4ADC-9FD5-75846890EEBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6E55BCE-BBF0-454B-AE86-45B7298888B3", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:*", "matchCriteriaId": "5860CBE4-328E-418D-9E81-1D3AF7DB8F2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89461FD4-897D-44F1-8486-4BCCDE3772DD", "versionEndExcluding": "4.4.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F87D851-15BC-4FC1-8AB7-D5C15B2B74F0", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3D46DEC-06AB-489F-A0B5-10C31F80A8C1", "versionEndExcluding": "4.4.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*", "matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B1826F9-0258-44DD-A471-113CF55CE563", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*", "matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A559F44-80F8-44B7-B70F-BA0B78C85283", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EA9DF5D-6651-455A-9305-C42C0FF51F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4AB3320-27F8-4359-AEF8-6B1FDBA67111", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B9436B-B2FE-4644-BB06-B0537EC23A71", "versionEndExcluding": "4.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDBC681E-CD03-49E5-BC3A-E4A7654975A3", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABDC93B5-DC0A-4AA4-A340-382F108AE80B", "versionEndExcluding": "4.4.3.1", "versionStartIncluding": "4.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FF86645-253A-4BA3-BA2A-2725575C390D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59521C99-00BA-4503-823E-3FEA44F8DDA0", "versionEndExcluding": "4.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B937F11C-FC86-4D6E-A46B-BA2CA0FFCEF7", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2602941C-255F-4289-9043-D396CC4B3192", "versionEndExcluding": "4.4.3.1", "versionStartIncluding": "4.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*", "matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0549C870-BE10-441A-B07D-0701915E5A9E", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D1A9825-E419-4740-996A-5928D207FCB6", "versionEndExcluding": "4.4.3.1", "versionStartIncluding": "4.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84670562-F228-40A0-A38D-144EA62556D3", "versionEndExcluding": "4.3.6.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*", "matchCriteriaId": "282E5318-DAA8-4AA2-8E7D-4B8BD9162153", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1BD8E59-6C67-4C80-B25F-2C5814A8CF0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43265128-7E8E-4FE2-8488-AC5734A4AF70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*", "matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52F71B18-89B5-42C7-B4B7-448844D6AFBC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*", "matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A96F64C0-09DD-4553-AC5F-D722B8321B0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2C4077B-C73F-4431-9103-C09960E203E1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*", "matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D081E5D-7A68-47A0-9EFE-1FC01DA2FF23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C470B04-BD57-429B-80FC-328A7D2E35E5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*", "matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A688631-4B36-43CC-AEF8-D390081F01DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E207BB52-29F8-4F2F-AA06-855B38E22958", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*", "matchCriteriaId": "167336E2-AAA8-4424-AB07-2D7C9E1542B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD8437FD-65E2-4203-82B9-8FC32444204A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*", "matchCriteriaId": "64955940-3998-4B76-92D1-D9F3FAB874B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS." }, { "lang": "es", "value": "Los dispositivos DrayTek Vigor3910 hasta 4.3.2.6 permiten XSS reflejado basado en DOM no autenticado." } ], "id": "CVE-2024-41591", "lastModified": "2025-03-14T16:15:34.730", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-10-03T19:15:04.560", "references": [ { "source": "cve@mitre.org", "tags": [ "Mitigation", "Technical Description", "Third Party Advisory" ], "url": "https://www.forescout.com/resources/draybreak-draytek-research/" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://www.forescout.com/resources/draytek14-vulnerabilities" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.forescout.com/resources/draybreak-draytek-research/ | Third Party Advisory, Exploit, Mitigation | |
cve@mitre.org | https://www.forescout.com/resources/draytek14-vulnerabilities | Broken Link |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4137F610-B3BE-4B74-8409-B91E61C4EEEE", "versionEndExcluding": "3.9.8.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*", "matchCriteriaId": "167336E2-AAA8-4424-AB07-2D7C9E1542B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C7DD492-4294-484D-A4D2-BCCCA152D57F", "versionEndExcluding": "3.9.8.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D98663B-F2F5-4ADC-9FD5-75846890EEBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6E55BCE-BBF0-454B-AE86-45B7298888B3", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:*", "matchCriteriaId": "5860CBE4-328E-418D-9E81-1D3AF7DB8F2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89461FD4-897D-44F1-8486-4BCCDE3772DD", "versionEndExcluding": "4.4.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F87D851-15BC-4FC1-8AB7-D5C15B2B74F0", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3D46DEC-06AB-489F-A0B5-10C31F80A8C1", "versionEndExcluding": "4.4.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*", "matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B1826F9-0258-44DD-A471-113CF55CE563", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*", "matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A559F44-80F8-44B7-B70F-BA0B78C85283", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EA9DF5D-6651-455A-9305-C42C0FF51F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4AB3320-27F8-4359-AEF8-6B1FDBA67111", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B9436B-B2FE-4644-BB06-B0537EC23A71", "versionEndExcluding": "4.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84670562-F228-40A0-A38D-144EA62556D3", "versionEndExcluding": "4.3.6.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*", "matchCriteriaId": "282E5318-DAA8-4AA2-8E7D-4B8BD9162153", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDBC681E-CD03-49E5-BC3A-E4A7654975A3", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABDC93B5-DC0A-4AA4-A340-382F108AE80B", "versionEndExcluding": "4.4.3.1", "versionStartIncluding": "4.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FF86645-253A-4BA3-BA2A-2725575C390D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59521C99-00BA-4503-823E-3FEA44F8DDA0", "versionEndExcluding": "4.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B937F11C-FC86-4D6E-A46B-BA2CA0FFCEF7", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2602941C-255F-4289-9043-D396CC4B3192", "versionEndExcluding": "4.4.3.1", "versionStartIncluding": "4.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*", "matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0549C870-BE10-441A-B07D-0701915E5A9E", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D1A9825-E419-4740-996A-5928D207FCB6", "versionEndExcluding": "4.4.3.1", "versionStartIncluding": "4.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7845410-6E90-4E92-8029-964A7F77EC57", "versionEndExcluding": "3.9.8.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0813DB7-4B52-40E1-9D5C-DBF9FA74EFD0", "versionEndExcluding": "3.9.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*", "matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B69D1EC-7C33-4367-80BA-4008E8C9A4BE", "versionEndExcluding": "3.9.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*", "matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D46E5FF5-6521-4A10-8CC5-34518A38ECFA", "versionEndExcluding": "3.9.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02588C38-E98C-4553-93C0-535A0C129783", "versionEndExcluding": "3.9.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*", "matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "765C62A0-BE3E-4661-8FD6-E9566B7C3C28", "versionEndExcluding": "3.9.9.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43C713BB-02A0-4CD4-A27F-943D5D538444", "versionEndExcluding": "3.9.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*", "matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "36FE9F0A-223F-42DC-BCB6-4A7A24A65130", "versionEndExcluding": "3.9.9.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F1ADAFE-5F59-4617-A20D-68675AE4AA61", "versionEndExcluding": "3.9.8.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*", "matchCriteriaId": "64955940-3998-4B76-92D1-D9F3FAB874B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "DrayTek Vigor3910 devices through 4.3.2.6 have a stack-based overflow when processing query string parameters because GetCGI mishandles extraneous ampersand characters and long key-value pairs." }, { "lang": "es", "value": "Los dispositivos DrayTek Vigor3910 hasta 4.3.2.6 tienen un desbordamiento basado en pila al procesar par\u00e1metros de cadena de consulta porque GetCGI maneja incorrectamente los caracteres ampersand extra\u00f1os y los pares clave-valor largos." } ], "id": "CVE-2024-41592", "lastModified": "2025-06-03T13:52:04.560", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-10-03T19:15:04.633", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "Exploit", "Mitigation" ], "url": "https://www.forescout.com/resources/draybreak-draytek-research/" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://www.forescout.com/resources/draytek14-vulnerabilities" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.forescout.com/resources/draybreak-draytek-research/ | Mitigation, Technical Description, Third Party Advisory | |
cve@mitre.org | https://www.forescout.com/resources/draytek14-vulnerabilities | Broken Link |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289E3E0B-6BA4-44B8-968A-AC374B15B631", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D98663B-F2F5-4ADC-9FD5-75846890EEBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6E55BCE-BBF0-454B-AE86-45B7298888B3", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:*", "matchCriteriaId": "5860CBE4-328E-418D-9E81-1D3AF7DB8F2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89461FD4-897D-44F1-8486-4BCCDE3772DD", "versionEndExcluding": "4.4.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F87D851-15BC-4FC1-8AB7-D5C15B2B74F0", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3D46DEC-06AB-489F-A0B5-10C31F80A8C1", "versionEndExcluding": "4.4.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*", "matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B1826F9-0258-44DD-A471-113CF55CE563", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*", "matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A559F44-80F8-44B7-B70F-BA0B78C85283", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EA9DF5D-6651-455A-9305-C42C0FF51F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4AB3320-27F8-4359-AEF8-6B1FDBA67111", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B9436B-B2FE-4644-BB06-B0537EC23A71", "versionEndExcluding": "4.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84670562-F228-40A0-A38D-144EA62556D3", "versionEndExcluding": "4.3.6.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*", "matchCriteriaId": "282E5318-DAA8-4AA2-8E7D-4B8BD9162153", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDBC681E-CD03-49E5-BC3A-E4A7654975A3", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABDC93B5-DC0A-4AA4-A340-382F108AE80B", "versionEndExcluding": "4.4.3.1", "versionStartIncluding": "4.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FF86645-253A-4BA3-BA2A-2725575C390D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59521C99-00BA-4503-823E-3FEA44F8DDA0", "versionEndExcluding": "4.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B937F11C-FC86-4D6E-A46B-BA2CA0FFCEF7", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2602941C-255F-4289-9043-D396CC4B3192", "versionEndExcluding": "4.4.3.1", "versionStartIncluding": "4.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*", "matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0549C870-BE10-441A-B07D-0701915E5A9E", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D1A9825-E419-4740-996A-5928D207FCB6", "versionEndExcluding": "4.4.3.1", "versionStartIncluding": "4.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1BD8E59-6C67-4C80-B25F-2C5814A8CF0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43265128-7E8E-4FE2-8488-AC5734A4AF70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*", "matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52F71B18-89B5-42C7-B4B7-448844D6AFBC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*", "matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A96F64C0-09DD-4553-AC5F-D722B8321B0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2C4077B-C73F-4431-9103-C09960E203E1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*", "matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D081E5D-7A68-47A0-9EFE-1FC01DA2FF23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C470B04-BD57-429B-80FC-328A7D2E35E5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*", "matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A688631-4B36-43CC-AEF8-D390081F01DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E207BB52-29F8-4F2F-AA06-855B38E22958", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*", "matchCriteriaId": "167336E2-AAA8-4424-AB07-2D7C9E1542B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD8437FD-65E2-4203-82B9-8FC32444204A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*", "matchCriteriaId": "64955940-3998-4B76-92D1-D9F3FAB874B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerabilities exist in DrayTek Vigor310 devices through 4.3.2.6 (in the Vigor management UI) because of improper retrieval and handling of the CGI form parameters." }, { "lang": "es", "value": "Existen vulnerabilidades de desbordamiento de b\u00fafer en los dispositivos DrayTek Vigor310 hasta la versi\u00f3n 4.3.2.6 (en la interfaz de administraci\u00f3n de Vigor) debido a la recuperaci\u00f3n y el manejo incorrectos de los par\u00e1metros del formulario CGI." } ], "id": "CVE-2024-41596", "lastModified": "2025-06-11T13:40:06.773", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-10-03T19:15:04.923", "references": [ { "source": "cve@mitre.org", "tags": [ "Mitigation", "Technical Description", "Third Party Advisory" ], "url": "https://www.forescout.com/resources/draybreak-draytek-research/" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://www.forescout.com/resources/draytek14-vulnerabilities" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://draytek.com | Product | |
cve@mitre.org | https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "120469A7-CC8F-46B9-8EAD-D272485DBBAC", "versionEndExcluding": "4.2.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "013EEA0E-3D6A-43AE-A504-8439462C4F20", "versionEndExcluding": "4.2.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41CEC37D-608B-4A8C-B8F4-803FF9A8179D", "versionEndExcluding": "3.9.8.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D98663B-F2F5-4ADC-9FD5-75846890EEBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDF86F14-D8AA-4F7A-978E-C390BECD2A56", "versionEndExcluding": "3.9.8.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B13C853-B725-4F3F-B919-1EDCF1F1FA6B", "versionEndExcluding": "3.9.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*", "matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9512D67-5D05-4707-9C01-FEF27BC7D8CD", "versionEndExcluding": "3.9.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*", "matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "825055C3-9212-4406-865A-5CCB27C4E3FE", "versionEndExcluding": "3.9.9.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E5E7BCA-A181-4689-80AD-5B0BF4A62D45", "versionEndExcluding": "3.9.9.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEF9194C-9EC2-4B08-8264-F58E1C649473", "versionEndExcluding": "3.9.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*", "matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "68C3D0EB-6019-43A2-BE4E-17E30985BCF0", "versionEndExcluding": "3.9.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*", "matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07D71EA7-2F97-4F7D-BDB8-246710EEEE34", "versionEndExcluding": "3.9.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FD4B17C-2E8A-45C9-8475-C5FD40C86052", "versionEndExcluding": "4.4.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "815465FB-9BDB-4A16-9E8A-A73B928A7999", "versionEndExcluding": "4.4.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*", "matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73E966A8-E862-4118-B178-93C297765B0B", "versionEndExcluding": "4.4.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "31F174D4-CDE6-401D-9040-34B862BDE1F9", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*", "matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9B2CD77-C72F-4C26-B082-EA2671A59116", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2927_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "570A3205-4E89-47E5-9FAE-2D4FFBD5A667", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2927:-:*:*:*:*:*:*:*", "matchCriteriaId": "12460F51-25AB-4EA9-BC43-9CE8DA992D75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D8A49BF-8174-42D6-B7C2-A461F0B3DC57", "versionEndExcluding": "4.3.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20C6D6BC-9B8D-4108-80F8-4647013B7843", "versionEndExcluding": "4.3.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*", "matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7ECBEFC-3444-4732-80C5-24E4B40B7413", "versionEndExcluding": "4.3.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*", "matchCriteriaId": "282E5318-DAA8-4AA2-8E7D-4B8BD9162153", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A NULL pointer dereference in Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 allows attackers to cause a Denial of Service (DoS) via a crafted DHCP request." }, { "lang": "es", "value": "Una desreferencia de puntero NULL en los dispositivos Draytek Vigor 165/166 anteriores a v4.2.6, Vigor 2620/LTE200 anteriores a v3.9.8.8, Vigor 2860/2925 anteriores a v3.9.7, Vigor 2862/2926 anteriores a v3.9.9.4, Vigor 2133/2762/2832 anteriores a v3.9.8, Vigor 2135/2765/2766 anteriores a v4.4.5.1, Vigor 2865/2866/2927 anteriores a v4.4.5.3, Vigor 2962/3910 anteriores a v4.3.2.7, Vigor 3912 anteriores a v4.3.5.2 y Vigor 2925 hasta v3.9.6 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud DHCP manipulada espec\u00edficamente." } ], "id": "CVE-2024-41338", "lastModified": "2025-06-03T14:06:40.670", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-02-27T21:15:36.753", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://draytek.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://draytek.com | Product | |
cve@mitre.org | https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "013EEA0E-3D6A-43AE-A504-8439462C4F20", "versionEndExcluding": "4.2.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41CEC37D-608B-4A8C-B8F4-803FF9A8179D", "versionEndExcluding": "3.9.8.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D98663B-F2F5-4ADC-9FD5-75846890EEBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDF86F14-D8AA-4F7A-978E-C390BECD2A56", "versionEndExcluding": "3.9.8.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B13C853-B725-4F3F-B919-1EDCF1F1FA6B", "versionEndExcluding": "3.9.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*", "matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9512D67-5D05-4707-9C01-FEF27BC7D8CD", "versionEndExcluding": "3.9.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*", "matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "825055C3-9212-4406-865A-5CCB27C4E3FE", "versionEndExcluding": "3.9.9.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E5E7BCA-A181-4689-80AD-5B0BF4A62D45", "versionEndExcluding": "3.9.9.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEF9194C-9EC2-4B08-8264-F58E1C649473", "versionEndExcluding": "3.9.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*", "matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "68C3D0EB-6019-43A2-BE4E-17E30985BCF0", "versionEndExcluding": "3.9.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*", "matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07D71EA7-2F97-4F7D-BDB8-246710EEEE34", "versionEndExcluding": "3.9.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FD4B17C-2E8A-45C9-8475-C5FD40C86052", "versionEndExcluding": "4.4.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "815465FB-9BDB-4A16-9E8A-A73B928A7999", "versionEndExcluding": "4.4.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*", "matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73E966A8-E862-4118-B178-93C297765B0B", "versionEndExcluding": "4.4.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "31F174D4-CDE6-401D-9040-34B862BDE1F9", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*", "matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9B2CD77-C72F-4C26-B082-EA2671A59116", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2927_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "570A3205-4E89-47E5-9FAE-2D4FFBD5A667", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2927:-:*:*:*:*:*:*:*", "matchCriteriaId": "12460F51-25AB-4EA9-BC43-9CE8DA992D75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D8A49BF-8174-42D6-B7C2-A461F0B3DC57", "versionEndExcluding": "4.3.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20C6D6BC-9B8D-4108-80F8-4647013B7843", "versionEndExcluding": "4.3.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*", "matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7ECBEFC-3444-4732-80C5-24E4B40B7413", "versionEndExcluding": "4.3.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*", "matchCriteriaId": "282E5318-DAA8-4AA2-8E7D-4B8BD9162153", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "120469A7-CC8F-46B9-8EAD-D272485DBBAC", "versionEndExcluding": "4.2.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 were discovered to not utilize certificate verification, allowing attackers to upload crafted APPE modules from non-official servers, leading to arbitrary code execution." }, { "lang": "es", "value": "Se descubri\u00f3 que los dispositivos Draytek Vigor 165/166 anteriores a la v4.2.6, Vigor 2620/LTE200 anteriores a la v3.9.8.8, Vigor 2860/2925 anteriores a la v3.9.7, Vigor 2862/2926 anteriores a la v3.9.9.4, Vigor 2133/2762/2832 anteriores a la v3.9.8, Vigor 2135/2765/2766 anteriores a la v4.4.5.1, Vigor 2865/2866/2927 anteriores a la v4.4.5.3, Vigor 2962/3910 anteriores a la v4.3.2.7, Vigor 3912 anteriores a la v4.3.5.2 y Vigor 2925 hasta la v3.9.6 no utilizaban la verificaci\u00f3n de certificados, lo que permit\u00eda a los atacantes cargar m\u00f3dulos APPE manipulados desde servidores no oficiales, lo que lleva a la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "id": "CVE-2024-41334", "lastModified": "2025-06-03T14:06:43.900", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-02-27T21:15:36.483", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://draytek.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.forescout.com/resources/draybreak-draytek-research/ | Mitigation, Technical Description, Third Party Advisory | |
cve@mitre.org | https://www.forescout.com/resources/draytek14-vulnerabilities | Broken Link |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B937F11C-FC86-4D6E-A46B-BA2CA0FFCEF7", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2602941C-255F-4289-9043-D396CC4B3192", "versionEndExcluding": "4.4.3.1", "versionStartIncluding": "4.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*", "matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84670562-F228-40A0-A38D-144EA62556D3", "versionEndExcluding": "4.3.6.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*", "matchCriteriaId": "282E5318-DAA8-4AA2-8E7D-4B8BD9162153", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0549C870-BE10-441A-B07D-0701915E5A9E", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D1A9825-E419-4740-996A-5928D207FCB6", "versionEndExcluding": "4.4.3.1", "versionStartIncluding": "4.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59521C99-00BA-4503-823E-3FEA44F8DDA0", "versionEndExcluding": "4.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDBC681E-CD03-49E5-BC3A-E4A7654975A3", "versionEndExcluding": "4.3.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABDC93B5-DC0A-4AA4-A340-382F108AE80B", "versionEndExcluding": "4.4.3.1", "versionStartIncluding": "4.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FF86645-253A-4BA3-BA2A-2725575C390D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B9436B-B2FE-4644-BB06-B0537EC23A71", "versionEndExcluding": "4.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4AB3320-27F8-4359-AEF8-6B1FDBA67111", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A559F44-80F8-44B7-B70F-BA0B78C85283", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EA9DF5D-6651-455A-9305-C42C0FF51F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B1826F9-0258-44DD-A471-113CF55CE563", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*", "matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3D46DEC-06AB-489F-A0B5-10C31F80A8C1", "versionEndExcluding": "4.4.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*", "matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F87D851-15BC-4FC1-8AB7-D5C15B2B74F0", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89461FD4-897D-44F1-8486-4BCCDE3772DD", "versionEndExcluding": "4.4.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6E55BCE-BBF0-454B-AE86-45B7298888B3", "versionEndExcluding": "4.4.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:*", "matchCriteriaId": "5860CBE4-328E-418D-9E81-1D3AF7DB8F2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289E3E0B-6BA4-44B8-968A-AC374B15B631", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D98663B-F2F5-4ADC-9FD5-75846890EEBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1BD8E59-6C67-4C80-B25F-2C5814A8CF0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43265128-7E8E-4FE2-8488-AC5734A4AF70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*", "matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52F71B18-89B5-42C7-B4B7-448844D6AFBC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*", "matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A96F64C0-09DD-4553-AC5F-D722B8321B0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2C4077B-C73F-4431-9103-C09960E203E1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*", "matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D081E5D-7A68-47A0-9EFE-1FC01DA2FF23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C470B04-BD57-429B-80FC-328A7D2E35E5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*", "matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A688631-4B36-43CC-AEF8-D390081F01DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E207BB52-29F8-4F2F-AA06-855B38E22958", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*", "matchCriteriaId": "167336E2-AAA8-4424-AB07-2D7C9E1542B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD8437FD-65E2-4203-82B9-8FC32444204A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*", "matchCriteriaId": "64955940-3998-4B76-92D1-D9F3FAB874B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stored XSS, by authenticated users, is caused by poor sanitization of the Login Page Greeting message in DrayTek Vigor310 devices through 4.3.2.6." }, { "lang": "es", "value": "El XSS almacenado, por parte de usuarios autenticados, es causado por una mala desinfecci\u00f3n del mensaje de saludo de la p\u00e1gina de inicio de sesi\u00f3n en los dispositivos DrayTek Vigor310 hasta 4.3.2.6." } ], "id": "CVE-2024-41587", "lastModified": "2025-03-18T16:15:22.733", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-10-03T19:15:04.310", "references": [ { "source": "cve@mitre.org", "tags": [ "Mitigation", "Technical Description", "Third Party Advisory" ], "url": "https://www.forescout.com/resources/draybreak-draytek-research/" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://www.forescout.com/resources/draytek14-vulnerabilities" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }