A vulnerability, which was classified as critical, has been found in DrayTek Vigor2960 and Vigor300B 1.5.1.3/1.5.1.4. This issue affects some unknown processing of the file /cgi-bin/mainfunction.cgi/apmcfgupptim of the component Web Management Interface. The manipulation of the argument session leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.
References
| Link | Resource |
|---|---|
| https://netsecfish.notion.site/Command-Injection-in-apmcfgupptim-endpoint-for-DrayTek-Gateway-Devices-1676b683e67c80b9ad8cc37b93273bf6?pvs=4 | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.289379 | Permissions Required VDB Entry |
| https://vuldb.com/?id.289379 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.468794 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2024-12-27 16:15
Updated : 2025-05-28 20:21
NVD link : CVE-2024-12986
Mitre link : CVE-2024-12986
CVE.ORG link : CVE-2024-12986
JSON object : View
Products Affected
draytek
- vigor2960_firmware
- vigor300b
- vigor300b_firmware
- vigor2960
