First published: Tue Jun 23 2020(Updated: )
A stack-based buffer overflow on DrayTek Vigor2960, Vigor3900, and Vigor300B devices before 1.5.1.1 allows remote attackers to execute arbitrary code via the formuserphonenumber parameter in an authusersms action to mainfunction.cgi.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Draytek Vigor300b Firmware | <1.5.1.1 | |
Draytek Vigor300b | ||
Draytek Vigor2960 Firmware | <1.5.1.1 | |
DrayTek Vigor2960 | ||
Draytek Vigor3900 Firmware | <1.5.1.1 | |
DrayTek Vigor3900 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-14993.
The severity of CVE-2020-14993 is critical with a CVSS score of 9.8.
DrayTek Vigor2960, Vigor3900, and Vigor300B devices before version 1.5.1.1 are affected by CVE-2020-14993.
Remote attackers can exploit CVE-2020-14993 by sending a malicious formuserphonenumber parameter in an authusersms action to mainfunction.cgi.
No, DrayTek Vigor3900 and Vigor2960 devices are not vulnerable to CVE-2020-14993.