8.4
CWE
434
Advisory Published
Updated

CVE-2024-41340: Malicious File Upload

First published: Thu Feb 27 2025(Updated: )

An issue in Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 allows attackers to upload crafted APP Enforcement modules, leading to arbitrary code execution.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
DrayTek Vigor165/166<4.2.6
DrayTek Vigor165/166<4.2.6
DrayTek Vigor2620/LTE200<3.9.8.8
DrayTek Vigor2620/LTE200<3.9.8.8
DrayTek Vigor2860/2925<3.9.7
Draytek Vigor2925 Firmware<3.9.7<=3.9.6
DrayTek Vigor2862/2926<3.9.9.4
DrayTek Vigor2862/2926<3.9.9.4
DrayTek Vigor2133/2762/2832<3.9.8
Draytek Vigor 2762<3.9.8
Draytek Vigor 2832<3.9.8
Draytek Vigor 2135<4.4.5.1
DrayTek Vigor2135/2765/2766<4.4.5.1
DrayTek Vigor2135/2765/2766<4.4.5.1
Draytek Vigor 2865<4.4.5.3
Draytek Vigor 2866<4.4.5.3
Draytek Vigor 2927<4.4.5.3
DrayTek Vigor2962/3910<4.3.2.7
DrayTek Vigor2962/3910<4.3.2.7
Draytek Vigor 3912<4.3.5.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-41340?

    CVE-2024-41340 is classified as a high severity vulnerability affecting specific Draytek devices.

  • How do I fix CVE-2024-41340?

    To mitigate CVE-2024-41340, update your Draytek device firmware to the latest version as listed in the advisory.

  • Which Draytek devices are affected by CVE-2024-41340?

    CVE-2024-41340 affects multiple Draytek models including Vigor 165, 166, 2620, LTE200, and others prior to their respective fixed versions.

  • What type of vulnerability is CVE-2024-41340?

    CVE-2024-41340 is a security vulnerability that can allow unauthorized access or exploitation of affected Draytek devices.

  • Is there a workaround for CVE-2024-41340?

    While applying the firmware update is the recommended approach, temporarily restricting access to the affected Draytek devices may serve as a workaround.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203