3 results (0.004 seconds)

CVSS: 8.1EPSS: 0%CPEs: 3EXPL: 1

Draytek Vigor2960 v1.5.1.4 and v1.5.1.5 are vulnerable to directory traversal via the mainfunction.cgi dumpSyslog 'option' parameter allowing an authenticated attacker with access to the web management interface to delete arbitrary files. Vigor2960 is no longer supported. Draytek Vigor2960 v1.5.1.4 y v1.5.1.5 son vulnerables a directory traversal a través del parámetro 'option' mainfunction.cgi dumpSyslog que permite a un atacante autenticado con acceso a la interfaz de administración web eliminar archivos arbitrarios. Vigor2960 ya no es compatible. • https://github.com/xxy1126/Vuln/blob/main/Draytek/4.md https://www.draytek.com/about/newsroom/2021/2021/end-of-life-notification-vigor2960 https://www.draytek.com/products/vigor2960 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

DrayTek Vigor2960 v1.5.1.4 allows an authenticated attacker with network access to the web management interface to inject operating system commands via the mainfunction.cgi 'parameter' parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. • https://github.com/sadwwcxz/Vul https://web.archive.org/web/20230315181013/https://github.com/sadwwcxz/Vul https://www.draytek.co.uk/support/guides/kb-remotemanagement https://www.draytek.com https://www.draytek.com/about/newsroom/2021/2021/end-of-life-notification-vigor2960 https://www.draytek.com/support/knowledge-base/5465 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 1

A vulnerability classified as critical has been found in DrayTek Vigor 2960 1.5.1.4/1.5.1.5. Affected is the function sub_1DF14 of the file /cgi-bin/mainfunction.cgi of the component Web Management Interface. The manipulation of the argument option with the input /../etc/passwd- leads to path traversal. It is possible to launch the attack remotely. • https://github.com/xxy1126/Vuln/blob/main/Draytek/1.md https://vuldb.com/?ctiid.221742 https://vuldb.com/?id.221742 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •