HTTP RULE(RULE ID:338984)

Rule General Information
Release Date: 2025-05-28
Rule Name: DrayTek Vigor300B Remote Code Execution Vulnerability (CVE-2024-12987)
Severity: Critical
CVE ID: CVE-2024-12987
Rule Protection Details
Description: A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.
Impact: An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Linux, Others
Reference: https://netsecfish.notion.site/Command-Injection-in-apmcfgupload-endpoint-for-DrayTek-Gateway-Devices-1676b683e67c8040b7f1f0ffe29ce18f?pvs=4
https://vuldb.com/?ctiid.289380
https://vuldb.com/?id.289380
https://vuldb.com/?submit.468795
Solutions
Please refer to announcements or patches release by the vendor: https://www.draytek.com/