First published: Thu Oct 03 2024(Updated: )
A stack-based Buffer Overflow vulnerability in DrayTek Vigor310 devices through 4.3.2.6 allows a remote attacker to execute arbitrary code via a long query string to the cgi-bin/ipfedr.cgi component.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DrayTek Vigor Routers | <=4.3.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41586 is considered a critical vulnerability due to the potential for remote code execution.
To remediate CVE-2024-41586, users should update their DrayTek Vigor310 devices to version 4.3.2.7 or later.
The potential impact of CVE-2024-41586 includes unauthorized access and execution of arbitrary code on the affected device.
CVE-2024-41586 affects DrayTek Vigor310 devices running versions up to and including 4.3.2.6.
Attackers can exploit CVE-2024-41586 by sending a specially crafted long query string to the cgi-bin/ipfedr.cgi component.