First published: Thu Oct 03 2024(Updated: )
Several CGI endpoints are vulnerable to buffer overflows, by authenticated users, because of missing bounds checking on parameters passed through POST requests to the strcpy function on DrayTek Vigor310 devices through 4.3.2.6.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DrayTek Vigor Routers | <=4.3.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41590 is considered a high severity vulnerability due to the potential for authenticated users to exploit it.
To fix CVE-2024-41590, update your DrayTek Vigor310 device firmware to a version beyond 4.3.2.6.
Authenticated users on DrayTek Vigor310 devices running version 4.3.2.6 or earlier are affected by CVE-2024-41590.
CVE-2024-41590 involves a buffer overflow due to missing bounds checking on parameters in POST requests.
CVE-2024-41590 can enable authenticated attackers to execute arbitrary code or cause denial-of-service conditions.