First published: Thu Oct 03 2024(Updated: )
Buffer Overflow vulnerabilities exist in DrayTek Vigor310 devices through 4.3.2.6 (in the Vigor management UI) because of improper retrieval and handling of the CGI form parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DrayTek Vigor Routers | <=4.3.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41596 is classified as a high severity vulnerability due to its potential to allow remote code execution through buffer overflow.
To fix CVE-2024-41596, update the DrayTek Vigor310 device firmware to version 4.3.2.7 or later.
CVE-2024-41596 affects DrayTek Vigor310 devices running firmware version 4.3.2.6 or earlier.
CVE-2024-41596 can be exploited by attackers who send specially crafted CGI form parameters to the vulnerable Vigor management UI.
There is no public information indicating that CVE-2024-41596 is currently being actively exploited, but users are advised to apply the patch promptly.