CVE-2021-20129
https://notcve.org/view.php?id=CVE-2021-20129
13 Oct 2021 — An information disclosure vulnerability exists in Draytek VigorConnect 1.6.0-B3, allowing an unauthenticated attacker to export system logs. Se presenta una vulnerabilidad de divulgación de información en Draytek VigorConnect versión 1.6.0-B3, que permite a un atacante no autenticado exportar los registros del sistema • https://www.tenable.com/security/research/tra-2021-42 • CWE-532: Insertion of Sensitive Information into Log File •
CVE-2021-20128
https://notcve.org/view.php?id=CVE-2021-20128
13 Oct 2021 — The Profile Name field in the floor plan (Network Menu) page in Draytek VigorConnect 1.6.0-B3 was found to be vulnerable to stored XSS, as user input is not properly sanitized. El campo Profile Name en la página floor plan (Network Menu) en Draytek VigorConnect versión 1.6.0-B3 se ha encontrado que es vulnerable a un ataque de tipo XSS almacenado, ya que la entrada del usuario no está saneada apropiadamente • https://www.tenable.com/security/research/tra-2021-42 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2021-20127
https://notcve.org/view.php?id=CVE-2021-20127
13 Oct 2021 — An arbitrary file deletion vulnerability exists in the file delete functionality of the Html5Servlet endpoint of Draytek VigorConnect 1.6.0-B3. This allows an authenticated user to arbitrarily delete files in any location on the target operating system with root privileges. Se presenta una vulnerabilidad de eliminación arbitraria de archivos en la funcionalidad file delete del endpoint Html5Servlet de Draytek VigorConnect versión 1.6.0-B3. Esto permite a un usuario autenticado eliminar arbitrariamente archi... • https://www.tenable.com/security/research/tra-2021-42 •
CVE-2021-20126
https://notcve.org/view.php?id=CVE-2021-20126
13 Oct 2021 — Draytek VigorConnect 1.6.0-B3 lacks cross-site request forgery protections and does not sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request. Draytek VigorConnect versión 1.6.0-B3, carece de protecciones contra vulnerabilidades de tipo cross-site request forgery y no comprueba suficientemente si una petición bien formada, válida y consistente fue proporcionada intencionadamente por el usuario que envió la petición • https://www.tenable.com/security/research/tra-2021-42 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2021-20125
https://notcve.org/view.php?id=CVE-2021-20125
13 Oct 2021 — An arbitrary file upload and directory traversal vulnerability exists in the file upload functionality of DownloadFileServlet in Draytek VigorConnect 1.6.0-B3. An unauthenticated attacker could leverage this vulnerability to upload files to any location on the target operating system with root privileges. Se presenta una vulnerabilidad de carga arbitraria de archivos y de salto de directorio en la funcionalidad upload functionality de DownloadFileServlet en Draytek VigorConnect versión 1.6.0-B3. Un atacante... • https://www.tenable.com/security/research/tra-2021-42 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2021-20124 – Draytek VigorConnect Path Traversal Vulnerability
https://notcve.org/view.php?id=CVE-2021-20124
13 Oct 2021 — A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the WebServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges. Se presenta una vulnerabilidad de inclusión de archivos locales en Draytek VigorConnect versión 1.6.0-B3, en la funcionalidad file download del endpoint WebServlet. Un atacante no autenticado podría aprovechar esta vulnerab... • https://www.tenable.com/security/research/tra-2021-42 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2021-20123 – Draytek VigorConnect Path Traversal Vulnerability
https://notcve.org/view.php?id=CVE-2021-20123
13 Oct 2021 — A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the DownloadFileServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges. Se presenta una vulnerabilidad de inclusión de archivos locales en Draytek VigorConnect versión 1.6.0-B3, en la funcionalidad file download del endpoint DownloadFileServlet. Un atacante no autenticado podría aprove... • https://www.tenable.com/security/research/tra-2021-42 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •