First published: Wed Aug 21 2024(Updated: )
DrayTek Vigor 3900 before v1.5.1.5_Beta, DrayTek Vigor 2960 before v1.5.1.5_Beta and DrayTek Vigor 300B before v1.5.1.5_Beta were discovered to contain a command injection vulnerability via the action parameter at cgi-bin/mainfunction.cgi.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DrayTek Vigor Routers | <1.5.1.5_Beta | |
DrayTek Vigor2960 | <1.5.1.5_Beta | |
DrayTek Vigor 300B | <1.5.1.5_Beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-43027 is classified as medium risk due to its command injection capability.
To fix CVE-2024-43027, upgrade your DrayTek Vigor 3900, Vigor 2960, or Vigor 300B to version 1.5.1.5_Beta or later.
CVE-2024-43027 affects the DrayTek Vigor 3900, Vigor 2960, and Vigor 300B routers running versions prior to 1.5.1.5_Beta.
CVE-2024-43027 is a command injection vulnerability that can be exploited through the action parameter in cgi-bin/mainfunction.cgi.
Currently, the recommended workaround for CVE-2024-43027 is to upgrade the affected devices to the latest firmware.