First published: Sat Feb 01 2020(Updated: )
DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI. This issue has been fixed in Vigor3900/2960/300B v1.5.1.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DrayTek Vigor Routers | ||
All of | ||
Draytek Vigor 2960 Firmware | =1.3.1-beta | |
DrayTek Vigor 2960 | ||
All of | ||
Any of | ||
Draytek Vigor300b Firmware | =1.3.3-beta | |
Draytek Vigor300b Firmware | =1.4.2.1-beta | |
Draytek Vigor300b Firmware | =1.4.4-beta | |
DrayTek Vigor 300B | ||
All of | ||
DrayTek Vigor 3900 | =1.4.4-beta | |
DrayTek Vigor Routers | ||
Draytek Vigor 2960 Firmware | =1.3.1-beta | |
DrayTek Vigor 2960 | ||
Draytek Vigor300b Firmware | =1.3.3-beta | |
Draytek Vigor300b Firmware | =1.4.2.1-beta | |
Draytek Vigor300b Firmware | =1.4.4-beta | |
DrayTek Vigor 300B | ||
DrayTek Vigor 3900 | =1.4.4-beta | |
DrayTek Vigor Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-8515 is critical with a score of 9.8.
DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices are affected.
Remote code execution can be achieved as root (without authentication) by using shell metacharacters to the cgi-bin/mainfunction.cgi URI.
Yes, this issue has been fixed in Vigor3900/2960/300B v1.5.1.
The CWE of CVE-2020-8515 is CWE-78.