vendor:
Vigor2960, Vigor3900, and Vigor300B
by:
0xsha.io
9.8
CVSS
CRITICAL
Remote Code Execution
78
CWE
Product Name: Vigor2960, Vigor3900, and Vigor300B
Affected Version From: 1.3.1_Beta, 1.4.4_Beta, 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta
Affected Version To: 1.5.1
Patch Exists: YES
Related CWE: CVE-2020-8515
CPE: h:draytek:vigor2960
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: None
2020
DrayTek pre-auth remote root RCE
A vulnerability in DrayTek Vigor2960, Vigor3900, and Vigor300B routers allows an unauthenticated attacker to execute arbitrary code with root privileges. This vulnerability is due to improper validation of user-supplied input in the web management page. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the web management page. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code with root privileges.
Mitigation:
Users should upgrade to Vigor3900/2960/300B v1.5.1 firmware or later.