First published: Thu Feb 27 2025(Updated: )
Buffer Overflow vulnerability in Vigor2620/LTE200 3.9.8.9 and earlier and Vigor2860/2925 3.9.8 and earlier and Vigor2862/2926 3.9.9.5 and earlier and Vigor2133/2762/2832 3.9.9 and earlier and Vigor165/166 4.2.7 and earlier and Vigor2135/2765/2766 4.4.5.1 and earlier and Vigor2865/2866/2927 4.4.5.3 and earlier and Vigor2962/3910 4.3.2.8/4.4.3.1 and earlier and Vigor3912 4.3.6.1 and earlier allows a remote attacker to execute arbitrary code via the CGI parser's handling of the "Content-Length" header of HTTP POST requests.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DrayTek Vigor2620/LTE200 | <3.9.8.9 | |
DrayTek Vigor2860/2925 | <3.9.8 | |
DrayTek Vigor2862/2926 | <3.9.9.5 | |
DrayTek Vigor2133/2762/2832 | <3.9.9 | |
DrayTek Vigor165/166 | <4.2.7 | |
DrayTek Vigor2135/2765/2766 | <4.4.5.1 | |
DrayTek Vigor2865/2866/2927 | <4.4.5.3 | |
DrayTek Vigor2962/3910 | <4.3.2.8<4.4.3.1 | |
DrayTek Vigor Routers | <4.3.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-51139 is classified as a buffer overflow vulnerability which can lead to potential system compromise.
To fix CVE-2024-51139, update the affected DrayTek devices to the latest firmware version recommended by the vendor.
CVE-2024-51139 affects multiple DrayTek devices, including models Vigor2620, Vigor2860, Vigor2862, and others with specific firmware versions.
If exploited, CVE-2024-51139 could allow an attacker to execute arbitrary code or crash the affected device.
Currently, the recommended workaround for CVE-2024-51139 is to apply the firmware update as soon as it is available.