First published: Wed Nov 22 2023(Updated: )
** UNSUPPORTED WHEN ASSIGNED ** Draytek Vigor2960 v1.5.1.4 and v1.5.1.5 are vulnerable to directory traversal via the mainfunction.cgi dumpSyslog 'option' parameter allowing an authenticated attacker with access to the web management interface to delete arbitrary files. Vigor2960 is no longer supported.
Credit: 9119a7d8-5eab-497f-8521-727c672e3725
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Draytek Vigor 2960 Firmware | =1.5.1.4 | |
Draytek Vigor 2960 Firmware | =1.5.1.5 | |
DrayTek Vigor 2960 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this DrayTek vulnerability is CVE-2023-6265.
The title of this DrayTek vulnerability is DrayTek Vigor2960 mainfunction.cgi dumpSyslog option directory traversal.
The severity rating of CVE-2023-6265 is 8.1 (High).
The vulnerability in DrayTek Vigor2960 occurs due to a directory traversal vulnerability in the mainfunction.cgi dumpSyslog 'option' parameter.
An authenticated attacker with access to the web management interface can exploit this vulnerability to delete arbitrary files.