A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.
References
Link | Resource |
---|---|
https://fw.draytek.com.tw/Vigor2960/Firmware/v1.5.1.5/DrayTek_Vigor2960_V1.5.1.5_01release-note.pdf | Release Notes |
https://fw.draytek.com.tw/Vigor300B/Firmware/v1.5.1.5/DrayTek_Vigor300B_V1.5.1.5_01release-note.pdf | Release Notes |
https://fw.draytek.com.tw/Vigor3900/Firmware/v1.5.1.5/DrayTek_Vigor3900_V1.5.1.5_01release-note.pdf | Not Applicable |
https://netsecfish.notion.site/Command-Injection-in-apmcfgupload-endpoint-for-DrayTek-Gateway-Devices-1676b683e67c8040b7f1f0ffe29ce18f?pvs=4 | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.289380 | Permissions Required VDB Entry |
https://vuldb.com/?id.289380 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.468795 | Third Party Advisory VDB Entry |
Configurations
History
16 May 2025, 18:43
Type | Values Removed | Values Added |
---|---|---|
First Time |
Draytek vigor2960
Draytek vigor300b Draytek vigor300b Firmware Draytek Draytek vigor2960 Firmware |
|
CPE | cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor2960_firmware:1.5.1.4:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor300b_firmware:1.5.1.4:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor300b:-:*:*:*:*:*:*:* |
|
References | () https://vuldb.com/?id.289380 - Third Party Advisory, VDB Entry | |
References | () https://fw.draytek.com.tw/Vigor3900/Firmware/v1.5.1.5/DrayTek_Vigor3900_V1.5.1.5_01release-note.pdf - Not Applicable | |
References | () https://fw.draytek.com.tw/Vigor2960/Firmware/v1.5.1.5/DrayTek_Vigor2960_V1.5.1.5_01release-note.pdf - Release Notes | |
References | () https://vuldb.com/?ctiid.289380 - Permissions Required, VDB Entry | |
References | () https://fw.draytek.com.tw/Vigor300B/Firmware/v1.5.1.5/DrayTek_Vigor300B_V1.5.1.5_01release-note.pdf - Release Notes | |
References | () https://vuldb.com/?submit.468795 - Third Party Advisory, VDB Entry | |
References | () https://netsecfish.notion.site/Command-Injection-in-apmcfgupload-endpoint-for-DrayTek-Gateway-Devices-1676b683e67c8040b7f1f0ffe29ce18f?pvs=4 - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
15 May 2025, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 May 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Dec 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
CWE | CWE-78 |
27 Dec 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-27 16:15
Updated : 2025-05-16 18:43
NVD link : CVE-2024-12987
Mitre link : CVE-2024-12987
JSON object : View
Products Affected
draytek
- vigor2960
- vigor300b
- vigor300b_firmware
- vigor2960_firmware
CWE
No CWE.