First published: Mon Nov 04 2024(Updated: )
DrayTek Vigor3900 1.5.1.3 contains a command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `delete_map_profile.`
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DrayTek Vigor Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45882 is classified as a high severity vulnerability due to its command injection capabilities.
To fix CVE-2024-45882, update the DrayTek Vigor3900 to the latest firmware version that addresses this vulnerability.
The impact of CVE-2024-45882 includes potential unauthorized command execution through the affected parameter in the router.
Yes, CVE-2024-45882 is remote exploitable, allowing attackers to execute commands without physical access.
CVE-2024-45882 affects DrayTek Vigor3900 running firmware version 1.5.1.3.