Post-Authentication Command Injection in DrayTek Vigor3900
CVE-2024-45884

8HIGH

Key Information:

Vendor

DrayTek

Status
Vendor
CVE Published:
4 November 2024

What is CVE-2024-45884?

The DrayTek Vigor3900 version 1.5.1.3 is susceptible to a post-authentication command injection vulnerability. This flaw arises when the 'action' parameter is manipulated within the 'cgi-bin/mainfunction.cgi' script using the 'setSWMGroup' action. Successful exploitation may allow an authenticated attacker to execute arbitrary commands on the device, potentially compromising its confidentiality, integrity, and availability.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

References

CVSS V3.1

Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.