First published: Thu Mar 26 2020(Updated: )
/cgi-bin/activate.cgi on Draytek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1 allows remote attackers to achieve command injection via a remote HTTP request in DEBUG mode.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Draytek Vigor300b Firmware | <1.5.1 | |
Draytek Vigor300b | ||
Draytek Vigor3900 Firmware | <1.5.1 | |
DrayTek Vigor3900 | ||
Draytek Vigor2960 Firmware | <1.5.1 | |
DrayTek Vigor2960 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10826 is a vulnerability that allows remote attackers to achieve command injection on Draytek Vigor3900, Vigor2960, and Vigor300B devices before firmware version 1.5.1 via a remote HTTP request in DEBUG mode.
CVE-2020-10826 has a severity value of 9.8, which is considered critical.
The CVE-2020-10826 vulnerability can be exploited by sending a remote HTTP request in DEBUG mode to the /cgi-bin/activate.cgi endpoint on affected Draytek Vigor3900, Vigor2960, and Vigor300B devices before firmware version 1.5.1.
CVE-2020-10826 affects Draytek Vigor3900, Vigor2960, and Vigor300B devices before firmware version 1.5.1.
Yes, the fix for CVE-2020-10826 is to update the firmware on the affected Draytek Vigor3900, Vigor2960, and Vigor300B devices to version 1.5.1 or newer.