Buffer Overflow Vulnerability in Draytek Vigor 3910 v4.3.2.6 Allows DoS via Crafted Input
CVE-2024-46591
7.5HIGH
Summary
The Draytek Vigor 3910, specifically version 4.3.2.6, contains a vulnerability that manifests as a buffer overflow in the processing of the sDnsPro parameter at the v2x00.cgi endpoint. Attackers can exploit this vulnerability by supplying specially crafted input, leading to a Denial of Service (DoS) condition. This flaw exposes users to significant risks, necessitating immediate attention and remediation to safeguard the system against potential exploitation.
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published