Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-12986

Опубликовано: 27 дек. 2024
Источник: nvd
CVSS3: 7.3
CVSS3: 9.8
CVSS2: 7.5
EPSS Средний

Описание

A vulnerability, which was classified as critical, has been found in DrayTek Vigor2960 and Vigor300B 1.5.1.3/1.5.1.4. This issue affects some unknown processing of the file /cgi-bin/mainfunction.cgi/apmcfgupptim of the component Web Management Interface. The manipulation of the argument session leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:draytek:vigor300b_firmware:*:*:*:*:*:*:*:*
Версия от 1.5.1.3 (включая) до 1.5.1.5 (исключая)
cpe:2.3:h:draytek:vigor300b:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:draytek:vigor2960_firmware:*:*:*:*:*:*:*:*
Версия от 1.5.1.3 (включая) до 1.5.1.5 (исключая)
cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:*

EPSS

Процентиль: 98%
0.53407
Средний

7.3 High

CVSS3

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-77
CWE-77

Связанные уязвимости

CVSS3: 7.3
github
12 месяцев назад

A vulnerability, which was classified as critical, has been found in DrayTek Vigor2960 and Vigor300B 1.5.1.3/1.5.1.4. This issue affects some unknown processing of the file /cgi-bin/mainfunction.cgi/apmcfgupptim of the component Web Management Interface. The manipulation of the argument session leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.

EPSS

Процентиль: 98%
0.53407
Средний

7.3 High

CVSS3

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-77
CWE-77