First published: Mon Nov 04 2024(Updated: )
DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `commandTable.`
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DrayTek Vigor Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45889 is classified as a high severity vulnerability due to its potential for command injection.
To remediate CVE-2024-45889, apply the latest firmware update from DrayTek that addresses the vulnerability.
CVE-2024-45889 affects the DrayTek Vigor3900 running the firmware version 1.5.1.3.
CVE-2024-45889 is a post-authentication command injection vulnerability.
In CVE-2024-45889, the 'action' parameter in 'cgi-bin/mainfunction.cgi' can be manipulated to execute arbitrary commands.