First published: Fri Sep 06 2024(Updated: )
DrayTek Vigor3900 v1.5.1.6 was discovered to contain an authenticated command injection vulnerability via the value parameter in the filter_string function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
DrayTek Vigor 3900 | =1.5.1.6 | |
DrayTek Vigor Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-44845 has been classified as a high severity vulnerability due to its potential for authenticated command injection.
To fix CVE-2024-44845, upgrade the DrayTek Vigor3900 firmware to a version where the vulnerability has been patched.
CVE-2024-44845 can be exploited through authenticated command injection attacks, allowing attackers to execute arbitrary commands.
CVE-2024-44845 affects DrayTek Vigor3900 firmware version 1.5.1.6 specifically.
Yes, CVE-2024-44845 requires user authentication to exploit the command injection vulnerability.