First published: Thu Oct 03 2024(Updated: )
DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to change settings or cause a denial of service via .cgi pages because of missing bounds checks on read and write operations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DrayTek Vigor Routers | <=4.3.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41595 has a high severity rating due to its potential for remote exploitation and denial of service.
To fix CVE-2024-41595, update DrayTek Vigor310 devices to the latest firmware version beyond 4.3.2.6.
Attackers can change settings or cause a denial of service on affected DrayTek Vigor310 devices through manipulated .cgi pages.
CVE-2024-41595 affects DrayTek Vigor310 devices running firmware version 4.3.2.6 or earlier.
CVE-2024-41595 is a remote code execution vulnerability due to missing bound checks on read and write operations.