A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.
References
Link | Resource |
---|---|
https://netsecfish.notion.site/Command-Injection-in-apmcfgupload-endpoint-for-DrayTek-Gateway-Devices-1676b683e67c8040b7f1f0ffe29ce18f?pvs=4 | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.289380 | Permissions Required VDB Entry |
https://vuldb.com/?id.289380 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.468795 | Third Party Advisory VDB Entry |
https://fw.draytek.com.tw/Vigor2960/Firmware/v1.5.1.5/DrayTek_Vigor2960_V1.5.1.5_01release-note.pdf | Release Notes |
https://fw.draytek.com.tw/Vigor300B/Firmware/v1.5.1.5/DrayTek_Vigor300B_V1.5.1.5_01release-note.pdf | Release Notes |
https://fw.draytek.com.tw/Vigor3900/Firmware/v1.5.1.5/DrayTek_Vigor3900_V1.5.1.5_01release-note.pdf | Not Applicable |
Configurations
History
16 May 2025, 18:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://netsecfish.notion.site/Command-Injection-in-apmcfgupload-endpoint-for-DrayTek-Gateway-Devices-1676b683e67c8040b7f1f0ffe29ce18f?pvs=4 - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.289380 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.289380 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.468795 - Third Party Advisory, VDB Entry | |
References | () https://fw.draytek.com.tw/Vigor2960/Firmware/v1.5.1.5/DrayTek_Vigor2960_V1.5.1.5_01release-note.pdf - Release Notes | |
References | () https://fw.draytek.com.tw/Vigor300B/Firmware/v1.5.1.5/DrayTek_Vigor300B_V1.5.1.5_01release-note.pdf - Release Notes | |
References | () https://fw.draytek.com.tw/Vigor3900/Firmware/v1.5.1.5/DrayTek_Vigor3900_V1.5.1.5_01release-note.pdf - Not Applicable | |
CPE | cpe:2.3:h:draytek:vigor300b:-:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor2960_firmware:1.5.1.4:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor300b_firmware:1.5.1.4:*:*:*:*:*:*:* |
|
First Time |
Draytek vigor300b Firmware
Draytek vigor300b Draytek vigor2960 Firmware Draytek Draytek vigor2960 |
15 May 2025, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 May 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
27 Dec 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Dec 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-27 16:15
Updated : 2025-05-16 18:43
NVD link : CVE-2024-12987
Mitre link : CVE-2024-12987
CVE.ORG link : CVE-2024-12987
JSON object : View
Products Affected
draytek
- vigor2960_firmware
- vigor300b
- vigor300b_firmware
- vigor2960