First published: Wed Oct 30 2024(Updated: )
DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doSSLTunnel function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DrayTek Vigor Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-51258 is classified as critical due to the potential for remote command execution.
To fix CVE-2024-51258, apply the latest firmware update for DrayTek Vigor3900 that addresses this vulnerability.
CVE-2024-51258 allows attackers to execute arbitrary commands on the device, potentially compromising system integrity.
CVE-2024-51258 affects users of DrayTek Vigor3900 running firmware version 1.5.1.3.
As a workaround for CVE-2024-51258, limit external access to the device's administrative interface.