{"uuid": "f609ab04-cc5c-4101-930f-748411bd55ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8515", "type": "seen", "source": "https://t.me/arpsyndicate/1247", "content": "#ExploitObserverAlert\n\nCVE-2020-8515\n\nDESCRIPTION: Exploit Observer has 37 entries related to CVE-2020-8515. DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI. This issue has been fixed in Vigor3900/2960/300B v1.5.1.\n\nFIRST-EPSS: 0.969210000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-04T16:16:00.000000Z"}