First published: Mon Nov 04 2024(Updated: )
In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the backup function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DrayTek Vigor Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-51251 has been classified with a severity rating that indicates high risk due to the potential for arbitrary command execution.
To fix CVE-2024-51251, update your Draytek Vigor3900 device to the latest firmware version that addresses this vulnerability.
CVE-2024-51251 can be exploited through command injection attacks targeting the mainfunction.cgi script.
CVE-2024-51251 specifically affects Draytek Vigor3900 running version 1.5.1.3.
Exploitation of CVE-2024-51251 could allow attackers to execute arbitrary commands on the affected device, potentially leading to unauthorized access or control.