First published: Wed Oct 13 2021(Updated: )
A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the DownloadFileServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.
Credit: vulnreport@tenable.com vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Draytek VigorConnect | =1.6.0-beta3 | |
=1.6.0-beta3 | ||
Draytek VigorConnect |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this local file inclusion vulnerability is CVE-2021-20123.
CVE-2021-20123 has a severity level of 7.5 (high).
The affected software for CVE-2021-20123 is Draytek VigorConnect 1.6.0-B3.
CVE-2021-20123 allows an unauthenticated attacker to download arbitrary files with root privileges by exploiting the file download functionality of the DownloadFileServlet endpoint in Draytek VigorConnect 1.6.0-B3.
Yes, it is recommended to upgrade to a fixed version of Draytek VigorConnect to mitigate CVE-2021-20123.