8
CVE-2024-41590
- EPSS 0.11%
- Veröffentlicht 03.10.2024 19:15:04
- Zuletzt bearbeitet 11.06.2025 13:49:57
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Several CGI endpoints are vulnerable to buffer overflows, by authenticated users, because of missing bounds checking on parameters passed through POST requests to the strcpy function on DrayTek Vigor310 devices through 4.3.2.6.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Draytek ≫ Vigor2765 Firmware Version < 4.4.5.3
Draytek ≫ Vigor2763 Firmware Version < 4.4.5.3
Draytek ≫ Vigor2135 Firmware Version < 4.4.5.3
Draytek ≫ Vigor166 Firmware Version < 4.2.7
Draytek ≫ Vigor3912 Firmware Version < 4.3.6.1
Draytek ≫ Vigor1000b Firmware Version < 4.3.2.8
Draytek ≫ Vigor1000b Firmware Version >= 4.4.0.0 < 4.4.3.1
Draytek ≫ Vigor165 Firmware Version < 4.2.7
Draytek ≫ Vigor3910 Firmware Version < 4.3.2.8
Draytek ≫ Vigor3910 Firmware Version >= 4.4.0.0 < 4.4.3.1
Draytek ≫ Vigor2962 Firmware Version < 4.3.2.8
Draytek ≫ Vigor2962 Firmware Version >= 4.4.0.0 < 4.4.3.1
Draytek ≫ Vigor2915 Firmware Version < 4.4.5.3
Draytek ≫ Vigor2866 Firmware Version < 4.4.5.2
Draytek ≫ Vigor2766 Firmware Version < 4.4.5.3
Draytek ≫ Vigor2865 Firmware Version < 4.4.5.2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.11% | 0.296 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 8 | 2.1 | 5.9 |
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-121 Stack-based Buffer Overflow
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).