First published: Thu Oct 03 2024(Updated: )
DrayTek Vigor3910 devices through 4.3.2.6 have a stack-based overflow when processing query string parameters because GetCGI mishandles extraneous ampersand characters and long key-value pairs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DrayTek Vigor Routers | <=4.3.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41592 is considered a high-severity vulnerability due to its potential for remote exploitation and system compromise.
To fix CVE-2024-41592, update your DrayTek Vigor3910 device to the latest firmware version beyond 4.3.2.6.
CVE-2024-41592 involves a stack-based overflow caused by mishandling query string parameters in the GetCGI function.
CVE-2024-41592 affects DrayTek Vigor3910 devices running firmware version 4.3.2.6 or earlier.
Yes, CVE-2024-41592 can be exploited remotely, allowing attackers to execute arbitrary code on the affected devices.