First published: Thu Mar 26 2020(Updated: )
A stack-based buffer overflow in /cgi-bin/activate.cgi while base64 decoding ticket parameter on Draytek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1 allows remote attackers to achieve code execution via a remote HTTP request (issue 3 of 3).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Draytek Vigor300b Firmware | <1.5.1 | |
Draytek Vigor300b | ||
Draytek Vigor3900 Firmware | <1.5.1 | |
DrayTek Vigor3900 | ||
Draytek Vigor2960 Firmware | <1.5.1 | |
DrayTek Vigor2960 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10825 is a vulnerability that allows remote attackers to achieve code execution via a stack-based buffer overflow in /cgi-bin/activate.cgi while base64 decoding the ticket parameter on Draytek Vigor3900, Vigor2960, and Vigor300B devices before version 1.5.1.
The severity rating of CVE-2020-10825 is 9.8 (Critical).
Draytek Vigor3900, Vigor2960, and Vigor300B devices before version 1.5.1 are affected by CVE-2020-10825.
Remote attackers can exploit CVE-2020-10825 by sending a specially crafted HTTP request to the affected devices.
Yes, a fix is available for CVE-2020-10825. Users should update their Draytek Vigor3900, Vigor2960, and Vigor300B devices to version 1.5.1 or later.