Buffer Overflow Vulnerability in Draytek Vigor 3910 v4.3.2.6 Allows DoS via Crafted Input
CVE-2024-46591

7.5HIGH

Key Information:

Vendor
Draytek
Vendor
CVE Published:
18 September 2024

Summary

The Draytek Vigor 3910, specifically version 4.3.2.6, contains a vulnerability that manifests as a buffer overflow in the processing of the sDnsPro parameter at the v2x00.cgi endpoint. Attackers can exploit this vulnerability by supplying specially crafted input, leading to a Denial of Service (DoS) condition. This flaw exposes users to significant risks, necessitating immediate attention and remediation to safeguard the system against potential exploitation.

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.