First published: Thu Oct 31 2024(Updated: )
DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the setup_cacertificate function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DrayTek Vigor Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-51259 is considered a high severity vulnerability due to its ability to allow arbitrary command execution.
To protect against CVE-2024-51259, ensure that your DrayTek Vigor3900 router is updated to the latest firmware version.
CVE-2024-51259 specifically affects DrayTek Vigor3900 routers running firmware version 1.5.1.3.
CVE-2024-51259 facilitates command injection attacks through the mainfunction.cgi interface.
You can check if your device is vulnerable to CVE-2024-51259 by verifying if it is running DrayTek Vigor3900 firmware version 1.5.1.3.