First published: Wed Oct 13 2021(Updated: )
A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the WebServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.
Credit: vulnreport@tenable.com vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Draytek VigorConnect | =1.6.0-beta3 | |
=1.6.0-beta3 | ||
Draytek VigorConnect |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Draytek VigorConnect vulnerability is CVE-2021-20124.
The severity of CVE-2021-20124 is high with a CVSS score of 7.5.
The affected software for CVE-2021-20124 is Draytek VigorConnect 1.6.0-Beta3.
CVE-2021-20124 is a local file inclusion vulnerability in Draytek VigorConnect 1.6.0-B3. An unauthenticated attacker could download arbitrary files from the underlying operating system with root privileges.
No, CVE-2021-20124 can be exploited by an unauthenticated attacker.