Post-authentication Command Injection Vulnerability in DrayTek Vigor3900
CVE-2024-45890

8HIGH

Key Information:

Vendor

DrayTek

Status
Vendor
CVE Published:
4 November 2024

What is CVE-2024-45890?

The DrayTek Vigor3900 firmware version 1.5.1.3 is susceptible to a post-authentication command injection vulnerability that exploits the action parameter within the cgi-bin/mainfunction.cgi file when set to download_ovpn. This flaw can allow unauthorized users to execute arbitrary commands on the vulnerable device, potentially compromising its security and operation.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

References

CVSS V3.1

Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.