First published: Mon Nov 04 2024(Updated: )
DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `setSWMGroup.`
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DrayTek Vigor Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45884 is considered a critical vulnerability due to its potential for command injection post-authentication.
To fix CVE-2024-45884, update the DrayTek Vigor3900 to a version that addresses this vulnerability.
The impact of CVE-2024-45884 allows an authenticated attacker to execute arbitrary commands on the device.
CVE-2024-45884 affects DrayTek Vigor3900 running firmware version 1.5.1.3.
You can determine if your DrayTek Vigor3900 is vulnerable by checking if it is running firmware version 1.5.1.3 or earlier and testing the `action` parameter in `cgi-bin/mainfunction.cgi`.