CVE-2024-41583
https://notcve.org/view.php?id=CVE-2024-41583
03 Oct 2024 — DrayTek Vigor3910 devices through 4.3.2.6 are vulnerable to stored Cross Site Scripting (XSS) by authenticated users due to poor sanitization of the router name. • https://www.forescout.com/resources/draybreak-draytek-research • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2024-41584
https://notcve.org/view.php?id=CVE-2024-41584
03 Oct 2024 — DrayTek Vigor3910 devices through 4.3.2.6 are vulnerable to reflected XSS by authenticated users, caused by missing validation of the sFormAuthStr parameter. • https://www.forescout.com/resources/draybreak-draytek-research • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2024-41585
https://notcve.org/view.php?id=CVE-2024-41585
03 Oct 2024 — DrayTek Vigor3910 devices through 4.3.2.6 are affected by an OS command injection vulnerability that allows an attacker to leverage the recvCmd binary to escape from the emulated instance and inject arbitrary commands into the host machine. • https://www.forescout.com/resources/draybreak-draytek-research • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2024-41586
https://notcve.org/view.php?id=CVE-2024-41586
03 Oct 2024 — A stack-based Buffer Overflow vulnerability in DrayTek Vigor310 devices through 4.3.2.6 allows a remote attacker to execute arbitrary code via a long query string to the cgi-bin/ipfedr.cgi component. • https://www.forescout.com/resources/draybreak-draytek-research • CWE-121: Stack-based Buffer Overflow •
CVE-2024-41587
https://notcve.org/view.php?id=CVE-2024-41587
03 Oct 2024 — Stored XSS, by authenticated users, is caused by poor sanitization of the Login Page Greeting message in DrayTek Vigor310 devices through 4.3.2.6. • https://www.forescout.com/resources/draybreak-draytek-research •
CVE-2024-41588
https://notcve.org/view.php?id=CVE-2024-41588
03 Oct 2024 — The CGI endpoints v2x00.cgi and cgiwcg.cgi of DrayTek Vigor3910 devices through 4.3.2.6 are vulnerable to buffer overflows, by authenticated users, because of missing bounds checking on parameters passed through POST requests to the strncpy function. • https://www.forescout.com/resources/draybreak-draytek-research • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2024-41589
https://notcve.org/view.php?id=CVE-2024-41589
03 Oct 2024 — DrayTek Vigor310 devices through 4.3.2.6 use unencrypted HTTP for authentication requests. • https://www.forescout.com/resources/draybreak-draytek-research • CWE-287: Improper Authentication •
CVE-2024-41590
https://notcve.org/view.php?id=CVE-2024-41590
03 Oct 2024 — Several CGI endpoints are vulnerable to buffer overflows, by authenticated users, because of missing bounds checking on parameters passed through POST requests to the strcpy function on DrayTek Vigor310 devices through 4.3.2.6. • https://www.forescout.com/resources/draybreak-draytek-research • CWE-121: Stack-based Buffer Overflow •
CVE-2024-41591
https://notcve.org/view.php?id=CVE-2024-41591
03 Oct 2024 — DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS. • https://www.forescout.com/resources/draybreak-draytek-research •
CVE-2024-41592
https://notcve.org/view.php?id=CVE-2024-41592
03 Oct 2024 — DrayTek Vigor3910 devices through 4.3.2.6 have a stack-based overflow when processing query string parameters because GetCGI mishandles extraneous ampersand characters and long key-value pairs. • https://www.forescout.com/resources/draybreak-draytek-research • CWE-121: Stack-based Buffer Overflow •