8
CVE-2024-41588
- EPSS 0.1%
- Veröffentlicht 03.10.2024 19:15:04
- Zuletzt bearbeitet 11.06.2025 13:54:06
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
The CGI endpoints v2x00.cgi and cgiwcg.cgi of DrayTek Vigor3910 devices through 4.3.2.6 are vulnerable to buffer overflows, by authenticated users, because of missing bounds checking on parameters passed through POST requests to the strncpy function.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Draytek ≫ Vigor2915 Firmware Version < 4.4.5.3
Draytek ≫ Vigor2866 Firmware Version < 4.4.5.2
Draytek ≫ Vigor2766 Firmware Version < 4.4.5.3
Draytek ≫ Vigor2865 Firmware Version < 4.4.5.2
Draytek ≫ Vigor2765 Firmware Version < 4.4.5.3
Draytek ≫ Vigor2763 Firmware Version < 4.4.5.3
Draytek ≫ Vigor2135 Firmware Version < 4.4.5.3
Draytek ≫ Vigor166 Firmware Version < 4.2.7
Draytek ≫ Vigor3912 Firmware Version < 4.3.6.1
Draytek ≫ Vigor1000b Firmware Version < 4.3.2.8
Draytek ≫ Vigor1000b Firmware Version >= 4.4.0.0 < 4.4.3.1
Draytek ≫ Vigor165 Firmware Version < 4.2.7
Draytek ≫ Vigor3910 Firmware Version < 4.3.2.8
Draytek ≫ Vigor3910 Firmware Version >= 4.4.0.0 < 4.4.3.1
Draytek ≫ Vigor2962 Firmware Version < 4.3.2.8
Draytek ≫ Vigor2962 Firmware Version >= 4.4.0.0 < 4.4.3.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.1% | 0.281 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 8 | 2.1 | 5.9 |
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.