First published: Mon Nov 04 2024(Updated: )
DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injection vulnerability This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `download_ovpn.`
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DrayTek Vigor Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45890 is classified as a medium-severity vulnerability due to its potential impact after authentication.
To mitigate CVE-2024-45890, update the DrayTek Vigor3900 firmware to the latest version provided by DrayTek.
CVE-2024-45890 is a post-authentication command injection vulnerability affecting the DrayTek Vigor3900.
CVE-2024-45890 specifically affects the DrayTek Vigor3900 running firmware version 1.5.1.3.
An attacker exploiting CVE-2024-45890 can execute arbitrary commands on the DrayTek Vigor3900 after successfully authenticating.