First published: Sat Dec 09 2023(Updated: )
An OS Command Injection in the CLI interface on DrayTek Vigor167 version 5.2.2, allows remote attackers to execute arbitrary system commands and escalate privileges via any account created within the web interface.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Draytek Vigor167 Firmware | =5.2.2 | |
DrayTek Vigor Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-47254 is considered a critical vulnerability due to its ability to allow remote command execution and privilege escalation.
To fix CVE-2023-47254, upgrade the DrayTek Vigor167 to a patched firmware version that addresses the OS Command Injection issue.
CVE-2023-47254 affects users of the DrayTek Vigor167 running firmware version 5.2.2.
CVE-2023-47254 can be exploited through OS Command Injection attacks from the CLI interface.
Exploiting CVE-2023-47254 can lead to unauthorized remote access, arbitrary command execution, and escalated privileges.