First published: Thu Oct 31 2024(Updated: )
DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the sign_cacertificate function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DrayTek Vigor Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-51254 has a high severity rating due to the ability for attackers to execute arbitrary commands remotely.
To fix CVE-2024-51254, update DrayTek Vigor3900 to the latest firmware version provided by the vendor.
The impact of CVE-2024-51254 includes potential unauthorized access and control over the affected devices.
Specifically, version 1.5.1.3 of the DrayTek Vigor3900 is confirmed to be vulnerable to CVE-2024-51254.
CVE-2024-51254 involves command injection attacks through the mainfunction.cgi interface.