CVE-2023-1163
DrayTek Vigor 2960 Web Management Interface mainfunction.cgi getSyslogFile path traversal
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A vulnerability has been found in DrayTek Vigor 2960 1.5.1.4/1.5.1.5 and classified as critical. Affected by this vulnerability is the function getSyslogFile of the file mainfunction.cgi of the component Web Management Interface. The manipulation of the argument option leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222259. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
In DrayTek Vigor 2960 1.5.1.4/1.5.1.5 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Hierbei betrifft es die Funktion getSyslogFile der Datei mainfunction.cgi der Komponente Web Management Interface. Durch Manipulation des Arguments option mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung.
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability has been found in DrayTek Vigor 2960 1.5.1.4/1.5.1.5 and classified as critical. Affected by this vulnerability is the function getSyslogFile of the file mainfunction.cgi of the component Web Management Interface. The manipulation of the argument option leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222259. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-03-03 CVE Reserved
- 2023-03-03 CVE Published
- 2024-08-02 CVE Updated
- 2024-08-02 First Exploit
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://vuldb.com/?id.222259 | Technical Description |
URL | Date | SRC |
---|---|---|
https://github.com/xxy1126/Vuln/blob/main/Draytek/3.md | 2024-08-02 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Draytek Search vendor "Draytek" | Vigor 2960 Firmware Search vendor "Draytek" for product "Vigor 2960 Firmware" | 1.5.1.4 Search vendor "Draytek" for product "Vigor 2960 Firmware" and version "1.5.1.4" | - |
Affected
| in | Draytek Search vendor "Draytek" | Vigor 2960 Search vendor "Draytek" for product "Vigor 2960" | - | - |
Safe
|