Authenticated Command Injection Vulnerability in DrayTek Vigor3900 v1.5.1.6
CVE-2024-44845

8.8HIGH

Key Information:

Vendor
DrayTek
Vendor
CVE Published:
6 September 2024

Summary

The DrayTek Vigor3900 is vulnerable to an authenticated command injection issue that arises from improper handling of user input, specifically through the value parameter in the filter_string function. This flaw can potentially allow an attacker with authenticated access to execute arbitrary commands on the device, leading to unauthorized actions and compromising the security of the network managed by the Vigor3900. Users of affected versions are advised to apply necessary security patches to mitigate the risks associated with this vulnerability.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.