First published: Mon Nov 04 2024(Updated: )
DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `setSWMOption.`
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DrayTek Vigor Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45893 is considered a critical vulnerability due to its potential for command injection post-authentication.
To fix CVE-2024-45893, update the DrayTek Vigor3900 to the latest firmware version released by DrayTek.
CVE-2024-45893 affects the DrayTek Vigor3900 router specifically when using firmware version 1.5.1.3.
CVE-2024-45893 allows attackers to execute arbitrary commands on the system due to the command injection flaw.
Yes, CVE-2024-45893 can be readily exploited if the attacker has post-authentication access to the system.