|
|||
Rule General Information |
---|
Release Date: | 2025-05-28 | |
Rule Name: | DrayTek Vigor300B Remote Code Execution Vulnerability (CVE-2024-12987) | |
Severity: | Critical | |
CVE ID: | CVE-2024-12987 | |
Rule Protection Details |
---|
Description: | A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component. | |
Impact: | An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Linux, Others | |
Reference: | https://netsecfish.notion.site/Command-Injection-in-apmcfgupload-endpoint-for-DrayTek-Gateway-Devices-1676b683e67c8040b7f1f0ffe29ce18f?pvs=4 https://vuldb.com/?ctiid.289380 https://vuldb.com/?id.289380 https://vuldb.com/?submit.468795 |
|
Solutions |
---|
Please refer to announcements or patches release by the vendor: https://www.draytek.com/ |