Описание
DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI. This issue has been fixed in Vigor3900/2960/300B v1.5.1.
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- Permissions RequiredThird Party Advisory
- Vendor Advisory
- ExploitThird Party AdvisoryVDB Entry
- Permissions RequiredThird Party Advisory
- Vendor Advisory
- US Government Resource
Уязвимые конфигурации
Одновременно
Одновременно
Одно из
Одновременно
EPSS
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
Связанные уязвимости
DrayTek Vigor2960 1.3.1_Beta; Vigor3900 1.4.4_Beta; and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI.
Уязвимость интерфейса WebUI маршрутизаторов Vigor3900 / Vigor2960 / Vigor300B, позволяющая нарушителю выполнить произвольный код с привилегиями root
EPSS
9.8 Critical
CVSS3
10 Critical
CVSS2