First published: Wed Oct 30 2024(Updated: )
In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the dumpSyslog function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DrayTek Vigor Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-51299 is considered a high severity vulnerability due to the potential for arbitrary command execution.
To fix CVE-2024-51299, update your Draytek Vigor3900 to the latest firmware version provided by the vendor.
CVE-2024-51299 specifically affects Draytek Vigor3900 routers running version 1.5.1.3.
CVE-2024-51299 allows attackers to inject malicious commands and execute arbitrary commands on the device.
Yes, the vulnerability in CVE-2024-51299 can be exploited remotely, making it relatively easy for attackers to target unpatched systems.