First published: Mon Nov 04 2024(Updated: )
DrayTek Vigor3900 1.5.1.3 contains a command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `set_ap_map_config.'
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DrayTek Vigor Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45888 is classified as a high severity vulnerability due to its potential for remote command execution.
CVE-2024-45888 allows an attacker to execute arbitrary commands on the DrayTek Vigor3900 by manipulating the 'action' parameter in the affected CGI script.
To mitigate CVE-2024-45888, users should update their DrayTek Vigor3900 firmware to the latest version that addresses this vulnerability.
CVE-2024-45888 can be exploited through a specially crafted HTTP request targeting the vulnerable CGI endpoint.
As of now, there are no confirmed reports indicating that CVE-2024-45888 is being actively exploited in the wild.