- EPSS 1.08%
- Veröffentlicht 03.10.2024 19:15:04
- Zuletzt bearbeitet 10.04.2025 13:41:46
A stack-based Buffer Overflow vulnerability in DrayTek Vigor310 devices through 4.3.2.6 allows a remote attacker to execute arbitrary code via a long query string to the cgi-bin/ipfedr.cgi component.
CVE-2024-41587
- EPSS 0.17%
- Veröffentlicht 03.10.2024 19:15:04
- Zuletzt bearbeitet 18.03.2025 16:15:22
Stored XSS, by authenticated users, is caused by poor sanitization of the Login Page Greeting message in DrayTek Vigor310 devices through 4.3.2.6.
CVE-2024-41589
- EPSS 0.07%
- Veröffentlicht 03.10.2024 19:15:04
- Zuletzt bearbeitet 10.04.2025 13:43:37
DrayTek Vigor310 devices through 4.3.2.6 use unencrypted HTTP for authentication requests.
CVE-2024-41591
- EPSS 0.31%
- Veröffentlicht 03.10.2024 19:15:04
- Zuletzt bearbeitet 14.03.2025 16:15:34
DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS.
- EPSS 0.11%
- Veröffentlicht 03.10.2024 19:15:04
- Zuletzt bearbeitet 11.06.2025 13:49:57
Several CGI endpoints are vulnerable to buffer overflows, by authenticated users, because of missing bounds checking on parameters passed through POST requests to the strcpy function on DrayTek Vigor310 devices through 4.3.2.6.
- EPSS 2.03%
- Veröffentlicht 03.10.2024 19:15:04
- Zuletzt bearbeitet 03.06.2025 13:52:04
DrayTek Vigor3910 devices through 4.3.2.6 have a stack-based overflow when processing query string parameters because GetCGI mishandles extraneous ampersand characters and long key-value pairs.
CVE-2024-41593
- EPSS 7.69%
- Veröffentlicht 03.10.2024 19:15:04
- Zuletzt bearbeitet 13.03.2025 19:15:47
DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Ove...
CVE-2024-41594
- EPSS 0.07%
- Veröffentlicht 03.10.2024 19:15:04
- Zuletzt bearbeitet 19.03.2025 16:15:26
An issue in DrayTek Vigor310 devices through 4.3.2.6 allows an attacker to obtain sensitive information because the httpd server of the Vigor management UI uses a static string for seeding the PRNG of OpenSSL.
- EPSS 0.42%
- Veröffentlicht 03.10.2024 19:15:04
- Zuletzt bearbeitet 10.04.2025 14:37:24
DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to change settings or cause a denial of service via .cgi pages because of missing bounds checks on read and write operations.
- EPSS 0.06%
- Veröffentlicht 03.10.2024 19:15:04
- Zuletzt bearbeitet 11.06.2025 13:40:06
Buffer Overflow vulnerabilities exist in DrayTek Vigor310 devices through 4.3.2.6 (in the Vigor management UI) because of improper retrieval and handling of the CGI form parameters.