First published: Thu Oct 03 2024(Updated: )
The CGI endpoints v2x00.cgi and cgiwcg.cgi of DrayTek Vigor3910 devices through 4.3.2.6 are vulnerable to buffer overflows, by authenticated users, because of missing bounds checking on parameters passed through POST requests to the strncpy function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DrayTek Vigor Routers | <=4.3.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41588 is classified as a high severity vulnerability due to potential exploitation by authenticated users.
To fix CVE-2024-41588, update the DrayTek Vigor3910 firmware to version 4.3.2.7 or later.
CVE-2024-41588 can lead to buffer overflow attacks, potentially allowing attackers to execute arbitrary code.
CVE-2024-41588 affects users of DrayTek Vigor3910 devices running firmware version 4.3.2.6 or earlier.
Yes, authentication is required to exploit CVE-2024-41588, as it targets authenticated users.