10

CVE-2020-8515

Warnung
Exploit
DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI. This issue has been fixed in Vigor3900/2960/300B v1.5.1.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
DraytekVigor2960 Firmware Version1.3.1 Updatebeta
   DraytekVigor2960 Version-
DraytekVigor300b Firmware Version1.3.3 Updatebeta
   DraytekVigor300b Version-
DraytekVigor300b Firmware Version1.4.2.1 Updatebeta
   DraytekVigor300b Version-
DraytekVigor300b Firmware Version1.4.4 Updatebeta
   DraytekVigor300b Version-
DraytekVigor3900 Firmware Version1.4.4 Updatebeta
   DraytekVigor3900 Version-

03.11.2021: CISA Known Exploited Vulnerabilities (KEV) Catalog

Multiple DrayTek Vigor Routers Web Management Page Vulnerability

Schwachstelle

DrayTek Vigor3900, Vigor2960, and Vigor300B routers contain an unspecified vulnerability that allows for remote code execution.

Beschreibung

Apply updates per vendor instructions.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 94.36% 1
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
134c704f-9b21-4f2e-91b3-4a467353bcc0 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.