Search criteria
26 vulnerabilities found for vigor3910 by draytek
VAR-202303-0563
Vulnerability from variot - Updated: 2025-10-09 23:02Certain Draytek products are vulnerable to Cross Site Scripting (XSS) via the wlogin.cgi script and user_login.cgi script of the router's web application management portal. This affects Vigor3910, Vigor1000B, Vigor2962 v4.3.2.1; Vigor2865 and Vigor2866 v4.4.1.0; Vigor2927 v4.4.2.2; and Vigor2915, Vigor2765, Vigor2766, Vigor2135 v4.4.2.0; Vigor2763 v4.4.2.1; Vigor2862 and Vigor2926 v3.9.9.0; Vigor2925 v3.9.3; Vigor2952 and Vigor3220 v3.9.7.3; Vigor2133 and Vigor2762 v3.9.6.4; and Vigor2832 v3.9.6.2. vigor2860 firmware, vigor2860n firmware, vigor2860n-plus firmware etc. DrayTek Corporation A cross-site scripting vulnerability exists in the product.Information may be obtained and information may be tampered with
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202303-0563",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor2927lac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.2.3"
},
{
"model": "vigor166",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4.1"
},
{
"model": "vigor2860l",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.4"
},
{
"model": "vigor2926ln",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.1"
},
{
"model": "vigor2763",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.2.2"
},
{
"model": "vigor2926",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.1"
},
{
"model": "vigor2862",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.1"
},
{
"model": "vigor2133n",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6.5"
},
{
"model": "vigor2865lac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.1.1"
},
{
"model": "vigor2860ln",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.4"
},
{
"model": "vigor2135vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.2.1"
},
{
"model": "vigor2762",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6.5"
},
{
"model": "vigor2860vn-plus",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.4"
},
{
"model": "vigor2135ax",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.2.1"
},
{
"model": "vigor3220",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.7.4"
},
{
"model": "vigor2832",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6.3"
},
{
"model": "vigor2925ln",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.4"
},
{
"model": "vigor2765ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.2.1"
},
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.2"
},
{
"model": "vigor2766ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.2.1"
},
{
"model": "vigor2862ln",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.1"
},
{
"model": "vigor2925n",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.4"
},
{
"model": "vigor2926ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.1"
},
{
"model": "vigor2915ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.2.1"
},
{
"model": "vigor2763ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.2.2"
},
{
"model": "vigor2865vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.1.1"
},
{
"model": "vigor2862bn",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.1"
},
{
"model": "vigor2925l",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.4"
},
{
"model": "vigor2133ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6.5"
},
{
"model": "vigor2766vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.2.1"
},
{
"model": "vigor2915",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.2.1"
},
{
"model": "vigor2133fvac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6.5"
},
{
"model": "vigor2860n",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.4"
},
{
"model": "vigor2762vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6.5"
},
{
"model": "vigor2866lac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.1.1"
},
{
"model": "vigor2865l",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.1.1"
},
{
"model": "vigor2865ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.1.1"
},
{
"model": "vigor2925vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.4"
},
{
"model": "vigor2925vn-plus",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.4"
},
{
"model": "vigor2862b",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.1"
},
{
"model": "vigor2926n",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.1"
},
{
"model": "vigor2135ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.2.1"
},
{
"model": "vigor1000b",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.2"
},
{
"model": "vigor2926l",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.1"
},
{
"model": "vigor2762n",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6.5"
},
{
"model": "vigor2926vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.1"
},
{
"model": "vigor2866ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.1.1"
},
{
"model": "vigor130",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.8.5.1"
},
{
"model": "vigor2765",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.2.1"
},
{
"model": "vigor2925fn",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.4"
},
{
"model": "vigor2135fvac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.2.1"
},
{
"model": "vigor2133vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6.5"
},
{
"model": "vigor2860ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.4"
},
{
"model": "vigor2765va",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.2.1"
},
{
"model": "vigor2866",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.1.1"
},
{
"model": "vigor2860n-plus",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.4"
},
{
"model": "vigor2766ax",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.2.1"
},
{
"model": "vigor165",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4.1"
},
{
"model": "vigor2865ax",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.1.1"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.2"
},
{
"model": "vigor2952",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.7.4"
},
{
"model": "vigor2866vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.1.1"
},
{
"model": "vigor2927vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.2.3"
},
{
"model": "vigor2866l",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.1.1"
},
{
"model": "vigor2135",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.2.1"
},
{
"model": "vigor2925",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.4"
},
{
"model": "vigor2926lac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.1"
},
{
"model": "vigor2766",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.2.1"
},
{
"model": "vigor2952p",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.7.4"
},
{
"model": "vigor2865",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.1.1"
},
{
"model": "vigor2762ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6.5"
},
{
"model": "vigor2765ax",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.2.1"
},
{
"model": "vigornic 132",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.8.5.1"
},
{
"model": "vigor2862ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.1"
},
{
"model": "vigor2866ax",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.1.1"
},
{
"model": "vigor2927ax",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.2.3"
},
{
"model": "vigor2860",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.4"
},
{
"model": "vigor2860vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.4"
},
{
"model": "vigor2927ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.2.3"
},
{
"model": "vigor2862n",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.1"
},
{
"model": "vigor2925ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.4"
},
{
"model": "vigor2862lac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.1"
},
{
"model": "vigor2133",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6.5"
},
{
"model": "vigor2927l",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.2.3"
},
{
"model": "vigor2962p",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.2"
},
{
"model": "vigor2862vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.1"
},
{
"model": "vigor2862l",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.1"
},
{
"model": "vigor2927",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.2.3"
},
{
"model": "vigor2927f",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.2.3"
},
{
"model": "vigor2832n",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6.3"
},
{
"model": "vigor2925n-plus",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.4"
},
{
"model": "vigor2832n",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2766vac",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2832",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2860",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2765ax",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2765va",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2860vac",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2766ac",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2860n-plus",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2860ac",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2766ax",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2860vn-plus",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2763",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2860n",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2860l",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2860ln",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2765",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2763ac",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2765ac",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2766",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2023-004845"
},
{
"db": "NVD",
"id": "CVE-2023-23313"
}
]
},
"cve": "CVE-2023-23313",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 2.8,
"id": "CVE-2023-23313",
"impactScore": 2.7,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"trust": 2.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 6.1,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "CVE-2023-23313",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Changed",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2023-23313",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2023-23313",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2023-23313",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-202303-232",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202303-232"
},
{
"db": "JVNDB",
"id": "JVNDB-2023-004845"
},
{
"db": "NVD",
"id": "CVE-2023-23313"
},
{
"db": "NVD",
"id": "CVE-2023-23313"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Certain Draytek products are vulnerable to Cross Site Scripting (XSS) via the wlogin.cgi script and user_login.cgi script of the router\u0027s web application management portal. This affects Vigor3910, Vigor1000B, Vigor2962 v4.3.2.1; Vigor2865 and Vigor2866 v4.4.1.0; Vigor2927 v4.4.2.2; and Vigor2915, Vigor2765, Vigor2766, Vigor2135 v4.4.2.0; Vigor2763 v4.4.2.1; Vigor2862 and Vigor2926 v3.9.9.0; Vigor2925 v3.9.3; Vigor2952 and Vigor3220 v3.9.7.3; Vigor2133 and Vigor2762 v3.9.6.4; and Vigor2832 v3.9.6.2. vigor2860 firmware, vigor2860n firmware, vigor2860n-plus firmware etc. DrayTek Corporation A cross-site scripting vulnerability exists in the product.Information may be obtained and information may be tampered with",
"sources": [
{
"db": "NVD",
"id": "CVE-2023-23313"
},
{
"db": "JVNDB",
"id": "JVNDB-2023-004845"
},
{
"db": "VULMON",
"id": "CVE-2023-23313"
}
],
"trust": 1.71
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2023-23313",
"trust": 3.3
},
{
"db": "JVNDB",
"id": "JVNDB-2023-004845",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-202303-232",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2023-23313",
"trust": 0.1
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2023-23313"
},
{
"db": "CNNVD",
"id": "CNNVD-202303-232"
},
{
"db": "JVNDB",
"id": "JVNDB-2023-004845"
},
{
"db": "NVD",
"id": "CVE-2023-23313"
}
]
},
"id": "VAR-202303-0563",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.6666667
},
"last_update_date": "2025-10-09T23:02:19.523000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "DrayTek Vigor routers Fixes for cross-site scripting vulnerabilities",
"trust": 0.6,
"url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=228531"
}
],
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202303-232"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-79",
"trust": 1.0
},
{
"problemtype": "Cross-site scripting (CWE-79) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2023-004845"
},
{
"db": "NVD",
"id": "CVE-2023-23313"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "https://www.horizonconsulting.com/advisories23-multiple-xss-stored-in-draytek-routers-cve-2023-23313"
},
{
"trust": 1.5,
"url": "https://www.draytek.com/about/security-advisory/cross-site-scripting-vulnerability-(cve-2023-23313)/"
},
{
"trust": 1.0,
"url": "https://www.draytek.com/about/security-advisory/cross-site-scripting-vulnerability-%28cve-2023-23313%29/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-23313"
},
{
"trust": 0.7,
"url": "https://www.horizonsecurity.it/lang_en/advisories/?a=22\u0026title=multiple+xss+stored+in+draytek+routers+web+interface++cve202323313"
},
{
"trust": 0.6,
"url": "http://vigor3910vigor1000bvigor2962.com"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2023-23313/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2023-23313"
},
{
"db": "CNNVD",
"id": "CNNVD-202303-232"
},
{
"db": "JVNDB",
"id": "JVNDB-2023-004845"
},
{
"db": "NVD",
"id": "CVE-2023-23313"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULMON",
"id": "CVE-2023-23313"
},
{
"db": "CNNVD",
"id": "CNNVD-202303-232"
},
{
"db": "JVNDB",
"id": "JVNDB-2023-004845"
},
{
"db": "NVD",
"id": "CVE-2023-23313"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2023-03-03T00:00:00",
"db": "VULMON",
"id": "CVE-2023-23313"
},
{
"date": "2023-03-03T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202303-232"
},
{
"date": "2023-11-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2023-004845"
},
{
"date": "2023-03-03T22:15:09.690000",
"db": "NVD",
"id": "CVE-2023-23313"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2023-03-06T00:00:00",
"db": "VULMON",
"id": "CVE-2023-23313"
},
{
"date": "2023-05-22T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202303-232"
},
{
"date": "2023-11-02T04:46:00",
"db": "JVNDB",
"id": "JVNDB-2023-004845"
},
{
"date": "2025-10-07T19:00:07.737000",
"db": "NVD",
"id": "CVE-2023-23313"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202303-232"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0DrayTek\u00a0Corporation\u00a0 Cross-site scripting vulnerability in the product",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2023-004845"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "XSS",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202303-232"
}
],
"trust": 0.6
}
}
VAR-202410-3509
Vulnerability from variot - Updated: 2025-06-15 23:39The CGI endpoints v2x00.cgi and cgiwcg.cgi of DrayTek Vigor3910 devices through 4.3.2.6 are vulnerable to buffer overflows, by authenticated users, because of missing bounds checking on parameters passed through POST requests to the strncpy function. vigor2620 firmware, vigor2915 firmware, vigor2866 firmware etc. DrayTek Corporation The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202410-3509",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.1"
},
{
"model": "vigorlte200",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2952",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2865",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.2"
},
{
"model": "vigor1000b",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.1"
},
{
"model": "vigor2860",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2135",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2866",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.2"
},
{
"model": "vigor2762",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.1"
},
{
"model": "vigor1000b",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor2620",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2763",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2962",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.0.0"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor2765",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2926",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor3220",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2766",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor165",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.7"
},
{
"model": "vigor2832",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2925",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2915",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2133",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor166",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.7"
},
{
"model": "vigor3912",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.6.1"
},
{
"model": "vigor1000b",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.0.0"
},
{
"model": "vigor2862",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor3910",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.0.0"
},
{
"model": "vigor2133",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2915",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor165",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2135",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor1000b",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2763",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2866",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3912",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2865",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2620",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2762",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor166",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2766",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2765",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigorlte200",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2962",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024970"
},
{
"db": "NVD",
"id": "CVE-2024-41588"
}
]
},
"cve": "CVE-2024-41588",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "ADJACENT",
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.1,
"id": "CVE-2024-41588",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Adjacent Network",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 8.0,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2024-024970",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-41588",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "OTHER",
"id": "JVNDB-2024-024970",
"trust": 0.8,
"value": "High"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024970"
},
{
"db": "NVD",
"id": "CVE-2024-41588"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The CGI endpoints v2x00.cgi and cgiwcg.cgi of DrayTek Vigor3910 devices through 4.3.2.6 are vulnerable to buffer overflows, by authenticated users, because of missing bounds checking on parameters passed through POST requests to the strncpy function. vigor2620 firmware, vigor2915 firmware, vigor2866 firmware etc. DrayTek Corporation The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-41588"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-024970"
}
],
"trust": 1.62
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-41588",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2024-024970",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024970"
},
{
"db": "NVD",
"id": "CVE-2024-41588"
}
]
},
"id": "VAR-202410-3509",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.6666667
},
"last_update_date": "2025-06-15T23:39:49.897000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-120",
"trust": 1.0
},
{
"problemtype": "Classic buffer overflow (CWE-120) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024970"
},
{
"db": "NVD",
"id": "CVE-2024-41588"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "https://www.forescout.com/resources/draybreak-draytek-research/"
},
{
"trust": 1.0,
"url": "https://www.forescout.com/resources/draytek14-vulnerabilities"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-41588"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024970"
},
{
"db": "NVD",
"id": "CVE-2024-41588"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024970"
},
{
"db": "NVD",
"id": "CVE-2024-41588"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-06-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-024970"
},
{
"date": "2024-10-03T19:15:04.363000",
"db": "NVD",
"id": "CVE-2024-41588"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-06-12T02:27:00",
"db": "JVNDB",
"id": "JVNDB-2024-024970"
},
{
"date": "2025-06-11T13:54:06.133000",
"db": "NVD",
"id": "CVE-2024-41588"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0DrayTek\u00a0Corporation\u00a0 Classic buffer overflow vulnerability in the product",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024970"
}
],
"trust": 0.8
}
}
VAR-202410-0861
Vulnerability from variot - Updated: 2025-06-14 23:01Several CGI endpoints are vulnerable to buffer overflows, by authenticated users, because of missing bounds checking on parameters passed through POST requests to the strcpy function on DrayTek Vigor310 devices through 4.3.2.6. vigor2765 firmware, vigor2763 firmware, vigor2135 firmware etc. DrayTek Corporation The product contains a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202410-0861",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.1"
},
{
"model": "vigorlte200",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2952",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor1000b",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.1"
},
{
"model": "vigor2865",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.2"
},
{
"model": "vigor2860",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2135",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2866",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.2"
},
{
"model": "vigor2762",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.1"
},
{
"model": "vigor1000b",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor2620",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2763",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2962",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.0.0"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor2765",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2926",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor3220",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2766",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor165",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.7"
},
{
"model": "vigor2832",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2925",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2915",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2133",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor3912",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.6.1"
},
{
"model": "vigor1000b",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.0.0"
},
{
"model": "vigor166",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.7"
},
{
"model": "vigor2862",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor3910",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.0.0"
},
{
"model": "vigor2135",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor1000b",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2860",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3912",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2765",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2926",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigorlte200",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2762",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2133",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2832",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor165",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2925",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2962",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor166",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2763",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2862",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024980"
},
{
"db": "NVD",
"id": "CVE-2024-41590"
}
]
},
"cve": "CVE-2024-41590",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "ADJACENT",
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.1,
"id": "CVE-2024-41590",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Adjacent Network",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 8.0,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2024-024980",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-41590",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "OTHER",
"id": "JVNDB-2024-024980",
"trust": 0.8,
"value": "High"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024980"
},
{
"db": "NVD",
"id": "CVE-2024-41590"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Several CGI endpoints are vulnerable to buffer overflows, by authenticated users, because of missing bounds checking on parameters passed through POST requests to the strcpy function on DrayTek Vigor310 devices through 4.3.2.6. vigor2765 firmware, vigor2763 firmware, vigor2135 firmware etc. DrayTek Corporation The product contains a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-41590"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-024980"
}
],
"trust": 1.62
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-41590",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2024-024980",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024980"
},
{
"db": "NVD",
"id": "CVE-2024-41590"
}
]
},
"id": "VAR-202410-0861",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.6666667
},
"last_update_date": "2025-06-14T23:01:59.260000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-121",
"trust": 1.0
},
{
"problemtype": "Stack-based buffer overflow (CWE-121) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024980"
},
{
"db": "NVD",
"id": "CVE-2024-41590"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "https://www.forescout.com/resources/draybreak-draytek-research/"
},
{
"trust": 1.0,
"url": "https://www.forescout.com/resources/draytek14-vulnerabilities"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-41590"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024980"
},
{
"db": "NVD",
"id": "CVE-2024-41590"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024980"
},
{
"db": "NVD",
"id": "CVE-2024-41590"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-06-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-024980"
},
{
"date": "2024-10-03T19:15:04.487000",
"db": "NVD",
"id": "CVE-2024-41590"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-06-12T05:12:00",
"db": "JVNDB",
"id": "JVNDB-2024-024980"
},
{
"date": "2025-06-11T13:49:57.290000",
"db": "NVD",
"id": "CVE-2024-41590"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0DrayTek\u00a0Corporation\u00a0 Stack-based buffer overflow vulnerability in products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024980"
}
],
"trust": 0.8
}
}
VAR-202410-3388
Vulnerability from variot - Updated: 2025-06-14 22:55Buffer Overflow vulnerabilities exist in DrayTek Vigor310 devices through 4.3.2.6 (in the Vigor management UI) because of improper retrieval and handling of the CGI form parameters. vigor2620 firmware, vigor2915 firmware, vigor2866 firmware etc. DrayTek Corporation The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202410-3388",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor2865",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.2"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.1"
},
{
"model": "vigor2766",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor1000b",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.0.0"
},
{
"model": "vigor2866",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.2"
},
{
"model": "vigor2765",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor166",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.7"
},
{
"model": "vigor2862",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2952",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.1"
},
{
"model": "vigor1000b",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.1"
},
{
"model": "vigor2763",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2925",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2926",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2620",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigorlte200",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2832",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2135",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor3912",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.6.1"
},
{
"model": "vigor2962",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.0.0"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor3220",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor165",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.7"
},
{
"model": "vigor2915",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor3910",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.0.0"
},
{
"model": "vigor2762",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor2860",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2133",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor1000b",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor2135",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor1000b",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3912",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2765",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigorlte200",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2762",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2133",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor165",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2865",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2620",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor166",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2763",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2962",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2866",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2766",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2915",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024991"
},
{
"db": "NVD",
"id": "CVE-2024-41596"
}
]
},
"cve": "CVE-2024-41596",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "ADJACENT",
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.1,
"id": "CVE-2024-41596",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Adjacent Network",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 8.0,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2024-024991",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-41596",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "OTHER",
"id": "JVNDB-2024-024991",
"trust": 0.8,
"value": "High"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024991"
},
{
"db": "NVD",
"id": "CVE-2024-41596"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer Overflow vulnerabilities exist in DrayTek Vigor310 devices through 4.3.2.6 (in the Vigor management UI) because of improper retrieval and handling of the CGI form parameters. vigor2620 firmware, vigor2915 firmware, vigor2866 firmware etc. DrayTek Corporation The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-41596"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-024991"
}
],
"trust": 1.62
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-41596",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2024-024991",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024991"
},
{
"db": "NVD",
"id": "CVE-2024-41596"
}
]
},
"id": "VAR-202410-3388",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.6666667
},
"last_update_date": "2025-06-14T22:55:02.079000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-120",
"trust": 1.0
},
{
"problemtype": "Classic buffer overflow (CWE-120) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024991"
},
{
"db": "NVD",
"id": "CVE-2024-41596"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "https://www.forescout.com/resources/draybreak-draytek-research/"
},
{
"trust": 1.0,
"url": "https://www.forescout.com/resources/draytek14-vulnerabilities"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-41596"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024991"
},
{
"db": "NVD",
"id": "CVE-2024-41596"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024991"
},
{
"db": "NVD",
"id": "CVE-2024-41596"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-06-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-024991"
},
{
"date": "2024-10-03T19:15:04.923000",
"db": "NVD",
"id": "CVE-2024-41596"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-06-12T05:43:00",
"db": "JVNDB",
"id": "JVNDB-2024-024991"
},
{
"date": "2025-06-11T13:40:06.773000",
"db": "NVD",
"id": "CVE-2024-41596"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0DrayTek\u00a0Corporation\u00a0 Classic buffer overflow vulnerability in the product",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024991"
}
],
"trust": 0.8
}
}
VAR-202502-2174
Vulnerability from variot - Updated: 2025-06-06 23:33Vigor165/166 4.2.7 and earlier; Vigor2620/LTE200 3.9.8.9 and earlier; Vigor2860/2925 3.9.8 and earlier; Vigor2862/2926 3.9.9.5 and earlier; Vigor2133/2762/2832 3.9.9 and earlier; Vigor2135/2765/2766 4.4.5. and earlier; Vigor2865/2866/2927 4.4.5.3 and earlier; Vigor2962 4.3.2.8 and earlier; Vigor3912 4.3.6.1 and earlier; Vigor3910 4.4.3.1 and earlier a stack-based buffer overflow vulnerability has been identified in the URL parsing functionality of the TR069 STUN server. This flaw occurs due to insufficient bounds checking on the amount of URL parameters, allowing an attacker to exploit the overflow by sending a maliciously crafted request. Consequently, a remote attacker can execute arbitrary code with elevated privileges. vigor3912 firmware, vigor2620 firmware, vigorlte200 firmware etc. DrayTek Corporation The product contains a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202502-2174",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.2"
},
{
"model": "vigor2862",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.8"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.2"
},
{
"model": "vigor2765",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.5"
},
{
"model": "vigor2620",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.1"
},
{
"model": "vigor2832",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.2"
},
{
"model": "vigor1000b",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.2"
},
{
"model": "vigor2763",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.5"
},
{
"model": "vigor2766",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.5"
},
{
"model": "vigor3910",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3"
},
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.9"
},
{
"model": "vigor2915",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5"
},
{
"model": "vigor2135",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.5"
},
{
"model": "vigor2927",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.8"
},
{
"model": "vigor2962",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3"
},
{
"model": "vigor3220",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8.5"
},
{
"model": "vigor2860",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8.3"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.9"
},
{
"model": "vigor2865",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.8"
},
{
"model": "vigor3912",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.2"
},
{
"model": "vigor2952",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8.5"
},
{
"model": "vigorlte200",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.1"
},
{
"model": "vigor2925",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8.3"
},
{
"model": "vigor2133",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.2"
},
{
"model": "vigor2866",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.8"
},
{
"model": "vigor2926",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.8"
},
{
"model": "vigor2762",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.2"
},
{
"model": "vigor2620",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2135",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2926",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2860",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2962",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2762",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2766",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2765",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2862",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2832",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2865",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2927",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigorlte200",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2763",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3912",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2133",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2866",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2925",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024494"
},
{
"db": "NVD",
"id": "CVE-2024-51138"
}
]
},
"cve": "CVE-2024-51138",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2024-51138",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2024-024494",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-51138",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "OTHER",
"id": "JVNDB-2024-024494",
"trust": 0.8,
"value": "Critical"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024494"
},
{
"db": "NVD",
"id": "CVE-2024-51138"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Vigor165/166 4.2.7 and earlier; Vigor2620/LTE200 3.9.8.9 and earlier; Vigor2860/2925 3.9.8 and earlier; Vigor2862/2926 3.9.9.5 and earlier; Vigor2133/2762/2832 3.9.9 and earlier; Vigor2135/2765/2766 4.4.5. and earlier; Vigor2865/2866/2927 4.4.5.3 and earlier; Vigor2962 4.3.2.8 and earlier; Vigor3912 4.3.6.1 and earlier; Vigor3910 4.4.3.1 and earlier a stack-based buffer overflow vulnerability has been identified in the URL parsing functionality of the TR069 STUN server. This flaw occurs due to insufficient bounds checking on the amount of URL parameters, allowing an attacker to exploit the overflow by sending a maliciously crafted request. Consequently, a remote attacker can execute arbitrary code with elevated privileges. vigor3912 firmware, vigor2620 firmware, vigorlte200 firmware etc. DrayTek Corporation The product contains a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-51138"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-024494"
}
],
"trust": 1.62
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-51138",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2024-024494",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024494"
},
{
"db": "NVD",
"id": "CVE-2024-51138"
}
]
},
"id": "VAR-202502-2174",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.6666667
},
"last_update_date": "2025-06-06T23:33:03.729000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-121",
"trust": 1.0
},
{
"problemtype": "Stack-based buffer overflow (CWE-121) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024494"
},
{
"db": "NVD",
"id": "CVE-2024-51138"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "http://draytek.com"
},
{
"trust": 1.8,
"url": "https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-51138"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024494"
},
{
"db": "NVD",
"id": "CVE-2024-51138"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024494"
},
{
"db": "NVD",
"id": "CVE-2024-51138"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-06-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-024494"
},
{
"date": "2025-02-27T21:15:37.023000",
"db": "NVD",
"id": "CVE-2024-51138"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-06-02T08:34:00",
"db": "JVNDB",
"id": "JVNDB-2024-024494"
},
{
"date": "2025-05-28T16:41:26.460000",
"db": "NVD",
"id": "CVE-2024-51138"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0DrayTek\u00a0Corporation\u00a0 Stack-based buffer overflow vulnerability in products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024494"
}
],
"trust": 0.8
}
}
VAR-202502-3730
Vulnerability from variot - Updated: 2025-06-05 23:11A NULL pointer dereference in Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 allows attackers to cause a Denial of Service (DoS) via a crafted DHCP request. vigor165 firmware, vigor166 firmware, vigor2620 firmware etc. DrayTek Corporation The product has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202502-3730",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor2866",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor3912",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.5.2"
},
{
"model": "vigor2766",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.1"
},
{
"model": "vigor2620",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8.8"
},
{
"model": "vigor165",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.6"
},
{
"model": "vigor2927",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.7"
},
{
"model": "vigor2860",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.7"
},
{
"model": "vigor2925",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.7"
},
{
"model": "vigor166",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.6"
},
{
"model": "vigor2765",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.1"
},
{
"model": "vigor2762",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8"
},
{
"model": "vigorlte200",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8.8"
},
{
"model": "vigor2865",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2832",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8"
},
{
"model": "vigor2926",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.4"
},
{
"model": "vigor2135",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.1"
},
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.7"
},
{
"model": "vigor2133",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8"
},
{
"model": "vigor2862",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.4"
},
{
"model": "vigor2832",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2765",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor166",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor165",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2133",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2762",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2926",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2135",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3912",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2620",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2866",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2962",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2925",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2862",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2860",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2766",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2927",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigorlte200",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2865",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024567"
},
{
"db": "NVD",
"id": "CVE-2024-41338"
}
]
},
"cve": "CVE-2024-41338",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2024-41338",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2024-024567",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-41338",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "OTHER",
"id": "JVNDB-2024-024567",
"trust": 0.8,
"value": "High"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024567"
},
{
"db": "NVD",
"id": "CVE-2024-41338"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A NULL pointer dereference in Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 allows attackers to cause a Denial of Service (DoS) via a crafted DHCP request. vigor165 firmware, vigor166 firmware, vigor2620 firmware etc. DrayTek Corporation The product has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-41338"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-024567"
}
],
"trust": 1.62
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-41338",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2024-024567",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024567"
},
{
"db": "NVD",
"id": "CVE-2024-41338"
}
]
},
"id": "VAR-202502-3730",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.6666667
},
"last_update_date": "2025-06-05T23:11:17.299000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-476",
"trust": 1.0
},
{
"problemtype": "NULL Pointer dereference (CWE-476) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024567"
},
{
"db": "NVD",
"id": "CVE-2024-41338"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "http://draytek.com"
},
{
"trust": 1.8,
"url": "https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-41338"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024567"
},
{
"db": "NVD",
"id": "CVE-2024-41338"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024567"
},
{
"db": "NVD",
"id": "CVE-2024-41338"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-06-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-024567"
},
{
"date": "2025-02-27T21:15:36.753000",
"db": "NVD",
"id": "CVE-2024-41338"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-06-04T01:26:00",
"db": "JVNDB",
"id": "JVNDB-2024-024567"
},
{
"date": "2025-06-03T14:06:40.670000",
"db": "NVD",
"id": "CVE-2024-41338"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0DrayTek\u00a0Corporation\u00a0 In the product \u00a0NULL\u00a0 Pointer dereference vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024567"
}
],
"trust": 0.8
}
}
VAR-202502-3343
Vulnerability from variot - Updated: 2025-06-05 23:09An issue in the CGI endpoint used to upload configurations in Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 allows attackers to upload a crafted kernel module, allowing for arbitrary code execution. vigor165 firmware, vigor166 firmware, vigor2620 firmware etc. DrayTek Corporation The product contains an unrestricted file upload vulnerability of a dangerous type.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202502-3343",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor166",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.7"
},
{
"model": "vigor2866",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2860",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8"
},
{
"model": "vigor2762",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9"
},
{
"model": "vigor2766",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.1"
},
{
"model": "vigor2926",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.5"
},
{
"model": "vigor2832",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9"
},
{
"model": "vigor2927",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2862",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.5"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor2765",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.1"
},
{
"model": "vigor2133",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9"
},
{
"model": "vigor2620",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8.9"
},
{
"model": "vigor2865",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3"
},
{
"model": "vigorlte200",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8.9"
},
{
"model": "vigor2925",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8"
},
{
"model": "vigor2135",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.1"
},
{
"model": "vigor165",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.7"
},
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor2962",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.0"
},
{
"model": "vigor3912",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.6.1"
},
{
"model": "vigor2832",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2765",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor166",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor165",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2133",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2762",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2926",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2135",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2620",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2866",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2962",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2925",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2862",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2860",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2766",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2927",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigorlte200",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2865",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024541"
},
{
"db": "NVD",
"id": "CVE-2024-41339"
}
]
},
"cve": "CVE-2024-41339",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2024-41339",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 8.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2024-024541",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-41339",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "OTHER",
"id": "JVNDB-2024-024541",
"trust": 0.8,
"value": "High"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024541"
},
{
"db": "NVD",
"id": "CVE-2024-41339"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An issue in the CGI endpoint used to upload configurations in Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 allows attackers to upload a crafted kernel module, allowing for arbitrary code execution. vigor165 firmware, vigor166 firmware, vigor2620 firmware etc. DrayTek Corporation The product contains an unrestricted file upload vulnerability of a dangerous type.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-41339"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-024541"
}
],
"trust": 1.62
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-41339",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2024-024541",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024541"
},
{
"db": "NVD",
"id": "CVE-2024-41339"
}
]
},
"id": "VAR-202502-3343",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.6666667
},
"last_update_date": "2025-06-05T23:09:34.182000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-434",
"trust": 1.0
},
{
"problemtype": "Unlimited uploads of dangerous types of files (CWE-434) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024541"
},
{
"db": "NVD",
"id": "CVE-2024-41339"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "http://draytek.com"
},
{
"trust": 1.8,
"url": "https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-41339"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024541"
},
{
"db": "NVD",
"id": "CVE-2024-41339"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024541"
},
{
"db": "NVD",
"id": "CVE-2024-41339"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-06-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-024541"
},
{
"date": "2025-02-27T21:15:36.837000",
"db": "NVD",
"id": "CVE-2024-41339"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-06-04T00:48:00",
"db": "JVNDB",
"id": "JVNDB-2024-024541"
},
{
"date": "2025-06-03T13:52:39.957000",
"db": "NVD",
"id": "CVE-2024-41339"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0DrayTek\u00a0Corporation\u00a0 Unrestricted Upload of Dangerous File Types Vulnerability in Products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024541"
}
],
"trust": 0.8
}
}
VAR-202502-2792
Vulnerability from variot - Updated: 2025-06-05 23:05Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 were discovered to not utilize certificate verification, allowing attackers to upload crafted APPE modules from non-official servers, leading to arbitrary code execution. vigor166 firmware, vigor2620 firmware, vigorlte200 firmware etc. DrayTek Corporation The product contains a certificate validation vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202502-2792",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor2866",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor3912",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.5.2"
},
{
"model": "vigor2766",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.1"
},
{
"model": "vigor2620",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8.8"
},
{
"model": "vigor165",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.6"
},
{
"model": "vigor2927",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.7"
},
{
"model": "vigor2860",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.7"
},
{
"model": "vigor2925",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.7"
},
{
"model": "vigor166",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.6"
},
{
"model": "vigor2765",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.1"
},
{
"model": "vigor2762",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8"
},
{
"model": "vigorlte200",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8.8"
},
{
"model": "vigor2865",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2832",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8"
},
{
"model": "vigor2926",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.4"
},
{
"model": "vigor2135",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.1"
},
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.7"
},
{
"model": "vigor2133",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8"
},
{
"model": "vigor2862",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.4"
},
{
"model": "vigor2832",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2765",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor166",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor165",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2133",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2762",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2926",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2135",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3912",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2620",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2866",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2962",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2925",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2862",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2860",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2766",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2927",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigorlte200",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2865",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024560"
},
{
"db": "NVD",
"id": "CVE-2024-41334"
}
]
},
"cve": "CVE-2024-41334",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2024-41334",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 8.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2024-024560",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-41334",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "OTHER",
"id": "JVNDB-2024-024560",
"trust": 0.8,
"value": "High"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024560"
},
{
"db": "NVD",
"id": "CVE-2024-41334"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 were discovered to not utilize certificate verification, allowing attackers to upload crafted APPE modules from non-official servers, leading to arbitrary code execution. vigor166 firmware, vigor2620 firmware, vigorlte200 firmware etc. DrayTek Corporation The product contains a certificate validation vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-41334"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-024560"
}
],
"trust": 1.62
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-41334",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2024-024560",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024560"
},
{
"db": "NVD",
"id": "CVE-2024-41334"
}
]
},
"id": "VAR-202502-2792",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.6666667
},
"last_update_date": "2025-06-05T23:05:04.523000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-295",
"trust": 1.0
},
{
"problemtype": "Illegal certificate verification (CWE-295) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024560"
},
{
"db": "NVD",
"id": "CVE-2024-41334"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "http://draytek.com"
},
{
"trust": 1.8,
"url": "https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-41334"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024560"
},
{
"db": "NVD",
"id": "CVE-2024-41334"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024560"
},
{
"db": "NVD",
"id": "CVE-2024-41334"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-06-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-024560"
},
{
"date": "2025-02-27T21:15:36.483000",
"db": "NVD",
"id": "CVE-2024-41334"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-06-04T01:14:00",
"db": "JVNDB",
"id": "JVNDB-2024-024560"
},
{
"date": "2025-06-03T14:06:43.900000",
"db": "NVD",
"id": "CVE-2024-41334"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0DrayTek\u00a0Corporation\u00a0 Vulnerability related to certificate validation in products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024560"
}
],
"trust": 0.8
}
}
VAR-202502-2583
Vulnerability from variot - Updated: 2025-06-05 23:01An issue in Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 allows attackers to upload crafted APP Enforcement modules, leading to arbitrary code execution. vigor165 firmware, vigor166 firmware, vigor2620 firmware etc. DrayTek Corporation The product contains an unrestricted file upload vulnerability of a dangerous type.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202502-2583",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor166",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.7"
},
{
"model": "vigor2866",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2860",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8"
},
{
"model": "vigor2762",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9"
},
{
"model": "vigor2766",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.1"
},
{
"model": "vigor2926",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.5"
},
{
"model": "vigor2832",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9"
},
{
"model": "vigor2927",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2862",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.5"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor2765",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.1"
},
{
"model": "vigor2133",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9"
},
{
"model": "vigor2620",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8.9"
},
{
"model": "vigor2865",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3"
},
{
"model": "vigorlte200",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8.9"
},
{
"model": "vigor2925",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8"
},
{
"model": "vigor2135",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.1"
},
{
"model": "vigor165",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.7"
},
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor2962",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.0"
},
{
"model": "vigor3912",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.6.1"
},
{
"model": "vigor2832",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2765",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor166",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor165",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2133",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2762",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2926",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2135",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2620",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2866",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2962",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2925",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2862",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2860",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2766",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2927",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigorlte200",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2865",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024559"
},
{
"db": "NVD",
"id": "CVE-2024-41340"
}
]
},
"cve": "CVE-2024-41340",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.5,
"id": "CVE-2024-41340",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 8.4,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2024-024559",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-41340",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "OTHER",
"id": "JVNDB-2024-024559",
"trust": 0.8,
"value": "High"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024559"
},
{
"db": "NVD",
"id": "CVE-2024-41340"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An issue in Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 allows attackers to upload crafted APP Enforcement modules, leading to arbitrary code execution. vigor165 firmware, vigor166 firmware, vigor2620 firmware etc. DrayTek Corporation The product contains an unrestricted file upload vulnerability of a dangerous type.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-41340"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-024559"
}
],
"trust": 1.62
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-41340",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2024-024559",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024559"
},
{
"db": "NVD",
"id": "CVE-2024-41340"
}
]
},
"id": "VAR-202502-2583",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.6666667
},
"last_update_date": "2025-06-05T23:01:14.505000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-434",
"trust": 1.0
},
{
"problemtype": "Unlimited uploads of dangerous types of files (CWE-434) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024559"
},
{
"db": "NVD",
"id": "CVE-2024-41340"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "http://draytek.com"
},
{
"trust": 1.8,
"url": "https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-41340"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024559"
},
{
"db": "NVD",
"id": "CVE-2024-41340"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024559"
},
{
"db": "NVD",
"id": "CVE-2024-41340"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-06-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-024559"
},
{
"date": "2025-02-27T21:15:36.923000",
"db": "NVD",
"id": "CVE-2024-41340"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-06-04T01:14:00",
"db": "JVNDB",
"id": "JVNDB-2024-024559"
},
{
"date": "2025-06-03T13:52:23.300000",
"db": "NVD",
"id": "CVE-2024-41340"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0DrayTek\u00a0Corporation\u00a0 Unrestricted Upload of Dangerous File Types Vulnerability in Products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024559"
}
],
"trust": 0.8
}
}
VAR-202410-3635
Vulnerability from variot - Updated: 2025-06-03 23:35DrayTek Vigor3910 devices through 4.3.2.6 have a stack-based overflow when processing query string parameters because GetCGI mishandles extraneous ampersand characters and long key-value pairs. DrayTek Corporation of vigor3910 A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202410-3635",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor2766",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor166",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.7"
},
{
"model": "vigor2860",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8"
},
{
"model": "vigor2962",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.0.0"
},
{
"model": "vigor2762",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9"
},
{
"model": "vigor2926",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.5"
},
{
"model": "vigor2952",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8.2"
},
{
"model": "vigor2763",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2832",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9"
},
{
"model": "vigor3220",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8.2"
},
{
"model": "vigor2862",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.5"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor2765",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2866",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.2"
},
{
"model": "vigor1000b",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.1"
},
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.1"
},
{
"model": "vigor2133",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9"
},
{
"model": "vigor2620",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8.9"
},
{
"model": "vigor2915",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor1000b",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.0.0"
},
{
"model": "vigor3910",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.0.0"
},
{
"model": "vigor2135",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.1"
},
{
"model": "vigorlte200",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8.9"
},
{
"model": "vigor2925",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8"
},
{
"model": "vigor1000b",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor165",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.7"
},
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor2865",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.2"
},
{
"model": "vigor3912",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.6.1"
},
{
"model": "vigor3910",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": "lte",
"trust": 0.8,
"vendor": "draytek",
"version": "vigor3910 firmware 4.3.2.6 and earlier"
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 0.8,
"vendor": "draytek",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-021866"
},
{
"db": "NVD",
"id": "CVE-2024-41592"
}
]
},
"cve": "CVE-2024-41592",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "ADJACENT",
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.1,
"id": "CVE-2024-41592",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Adjacent Network",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 8.0,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2024-021866",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-41592",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "OTHER",
"id": "JVNDB-2024-021866",
"trust": 0.8,
"value": "High"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-021866"
},
{
"db": "NVD",
"id": "CVE-2024-41592"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "DrayTek Vigor3910 devices through 4.3.2.6 have a stack-based overflow when processing query string parameters because GetCGI mishandles extraneous ampersand characters and long key-value pairs. DrayTek Corporation of vigor3910 A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-41592"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-021866"
}
],
"trust": 1.62
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-41592",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2024-021866",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-021866"
},
{
"db": "NVD",
"id": "CVE-2024-41592"
}
]
},
"id": "VAR-202410-3635",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.6666667
},
"last_update_date": "2025-06-03T23:35:51.040000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-121",
"trust": 1.0
},
{
"problemtype": "Stack-based buffer overflow (CWE-121) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-021866"
},
{
"db": "NVD",
"id": "CVE-2024-41592"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "https://www.forescout.com/resources/draybreak-draytek-research/"
},
{
"trust": 1.0,
"url": "https://www.forescout.com/resources/draytek14-vulnerabilities"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-41592"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-021866"
},
{
"db": "NVD",
"id": "CVE-2024-41592"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "JVNDB",
"id": "JVNDB-2024-021866"
},
{
"db": "NVD",
"id": "CVE-2024-41592"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-04-11T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-021866"
},
{
"date": "2024-10-03T19:15:04.633000",
"db": "NVD",
"id": "CVE-2024-41592"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-04-11T01:36:00",
"db": "JVNDB",
"id": "JVNDB-2024-021866"
},
{
"date": "2025-06-03T13:52:04.560000",
"db": "NVD",
"id": "CVE-2024-41592"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "DrayTek\u00a0Corporation\u00a0 of \u00a0vigor3910\u00a0 Stack-based buffer overflow vulnerability in firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-021866"
}
],
"trust": 0.8
}
}
VAR-202502-3527
Vulnerability from variot - Updated: 2025-05-30 23:29Buffer Overflow vulnerability in Vigor2620/LTE200 3.9.8.9 and earlier and Vigor2860/2925 3.9.8 and earlier and Vigor2862/2926 3.9.9.5 and earlier and Vigor2133/2762/2832 3.9.9 and earlier and Vigor165/166 4.2.7 and earlier and Vigor2135/2765/2766 4.4.5.1 and earlier and Vigor2865/2866/2927 4.4.5.3 and earlier and Vigor2962/3910 4.3.2.8/4.4.3.1 and earlier and Vigor3912 4.3.6.1 and earlier allows a remote attacker to execute arbitrary code via the CGI parser's handling of the "Content-Length" header of HTTP POST requests. vigor2620 firmware, vigorlte200 firmware, vigor2860 firmware etc. DrayTek Corporation The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202502-3527",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor1000b",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.2"
},
{
"model": "vigor2926",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.8"
},
{
"model": "vigor2862",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.8"
},
{
"model": "vigor2133",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.2"
},
{
"model": "vigor2765",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.5"
},
{
"model": "vigor2865",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.8"
},
{
"model": "vigor2927",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.8"
},
{
"model": "vigor3910",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3"
},
{
"model": "vigor2962",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3"
},
{
"model": "vigor2763",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.5"
},
{
"model": "vigor2766",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.5"
},
{
"model": "vigor3912",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.2"
},
{
"model": "vigor2832",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.2"
},
{
"model": "vigor2860",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8.3"
},
{
"model": "vigor2762",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.2"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.2"
},
{
"model": "vigorlte200",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.1"
},
{
"model": "vigor2135",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.5"
},
{
"model": "vigor2925",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8.3"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.9"
},
{
"model": "vigor2866",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.8"
},
{
"model": "vigor2620",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.9.1"
},
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.2"
},
{
"model": "vigor2915",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5"
},
{
"model": "vigor3220",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8.5"
},
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.9"
},
{
"model": "vigor2952",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.8.5"
},
{
"model": "vigor2862",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2927",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2133",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2763",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2925",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2135",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2620",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2765",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2866",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2962",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2766",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2860",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2926",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2832",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigorlte200",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2762",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2865",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024338"
},
{
"db": "NVD",
"id": "CVE-2024-51139"
}
]
},
"cve": "CVE-2024-51139",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2024-51139",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2024-024338",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-51139",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "OTHER",
"id": "JVNDB-2024-024338",
"trust": 0.8,
"value": "Critical"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024338"
},
{
"db": "NVD",
"id": "CVE-2024-51139"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer Overflow vulnerability in Vigor2620/LTE200 3.9.8.9 and earlier and Vigor2860/2925 3.9.8 and earlier and Vigor2862/2926 3.9.9.5 and earlier and Vigor2133/2762/2832 3.9.9 and earlier and Vigor165/166 4.2.7 and earlier and Vigor2135/2765/2766 4.4.5.1 and earlier and Vigor2865/2866/2927 4.4.5.3 and earlier and Vigor2962/3910 4.3.2.8/4.4.3.1 and earlier and Vigor3912 4.3.6.1 and earlier allows a remote attacker to execute arbitrary code via the CGI parser\u0027s handling of the \"Content-Length\" header of HTTP POST requests. vigor2620 firmware, vigorlte200 firmware, vigor2860 firmware etc. DrayTek Corporation The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-51139"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-024338"
}
],
"trust": 1.62
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-51139",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2024-024338",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024338"
},
{
"db": "NVD",
"id": "CVE-2024-51139"
}
]
},
"id": "VAR-202502-3527",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.6666667
},
"last_update_date": "2025-05-30T23:29:21.699000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-120",
"trust": 1.0
},
{
"problemtype": "Classic buffer overflow (CWE-120) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024338"
},
{
"db": "NVD",
"id": "CVE-2024-51139"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "http://draytek.com"
},
{
"trust": 1.8,
"url": "https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-51139"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024338"
},
{
"db": "NVD",
"id": "CVE-2024-51139"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024338"
},
{
"db": "NVD",
"id": "CVE-2024-51139"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-05-29T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-024338"
},
{
"date": "2025-02-27T21:15:37.123000",
"db": "NVD",
"id": "CVE-2024-51139"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-05-29T05:34:00",
"db": "JVNDB",
"id": "JVNDB-2024-024338"
},
{
"date": "2025-05-28T16:23:26.310000",
"db": "NVD",
"id": "CVE-2024-51139"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0DrayTek\u00a0Corporation\u00a0 Classic buffer overflow vulnerability in the product",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-024338"
}
],
"trust": 0.8
}
}
VAR-202410-0179
Vulnerability from variot - Updated: 2025-03-20 23:31An issue in DrayTek Vigor310 devices through 4.3.2.6 allows an attacker to obtain sensitive information because the httpd server of the Vigor management UI uses a static string for seeding the PRNG of OpenSSL. vigor2620 firmware, vigor2915 firmware, vigor2866 firmware etc. DrayTek Corporation The product contains a cryptographic strength vulnerability.Information may be obtained
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202410-0179",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor2766",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor1000b",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.0.0"
},
{
"model": "vigor2135",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2620",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2865",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.2"
},
{
"model": "vigor2862",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2925",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2866",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.2"
},
{
"model": "vigorlte200",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2133",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2762",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2765",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.1"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.1"
},
{
"model": "vigor2763",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor3910",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.0.0"
},
{
"model": "vigor1000b",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor2832",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor166",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.7"
},
{
"model": "vigor2915",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor1000b",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.1"
},
{
"model": "vigor2952",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor165",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.7"
},
{
"model": "vigor3220",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2926",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2962",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.0.0"
},
{
"model": "vigor3912",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.6.1"
},
{
"model": "vigor2860",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2766",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2866",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2765",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2865",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor165",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2962",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2133",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2762",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigorlte200",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor1000b",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2915",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3912",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2620",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2763",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2135",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor166",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009984"
},
{
"db": "NVD",
"id": "CVE-2024-41594"
}
]
},
"cve": "CVE-2024-41594",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2024-41594",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2024-41594",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2024-41594",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-41594",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2024-41594",
"trust": 0.8,
"value": "High"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009984"
},
{
"db": "NVD",
"id": "CVE-2024-41594"
},
{
"db": "NVD",
"id": "CVE-2024-41594"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An issue in DrayTek Vigor310 devices through 4.3.2.6 allows an attacker to obtain sensitive information because the httpd server of the Vigor management UI uses a static string for seeding the PRNG of OpenSSL. vigor2620 firmware, vigor2915 firmware, vigor2866 firmware etc. DrayTek Corporation The product contains a cryptographic strength vulnerability.Information may be obtained",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-41594"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-009984"
}
],
"trust": 1.62
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-41594",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2024-009984",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009984"
},
{
"db": "NVD",
"id": "CVE-2024-41594"
}
]
},
"id": "VAR-202410-0179",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.6666667
},
"last_update_date": "2025-03-20T23:31:35.795000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-326",
"trust": 1.0
},
{
"problemtype": "Inappropriate cryptographic strength (CWE-326) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009984"
},
{
"db": "NVD",
"id": "CVE-2024-41594"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "https://www.forescout.com/resources/draybreak-draytek-research/"
},
{
"trust": 1.0,
"url": "https://www.forescout.com/resources/draytek14-vulnerabilities"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-41594"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009984"
},
{
"db": "NVD",
"id": "CVE-2024-41594"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009984"
},
{
"db": "NVD",
"id": "CVE-2024-41594"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-009984"
},
{
"date": "2024-10-03T19:15:04.800000",
"db": "NVD",
"id": "CVE-2024-41594"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T01:14:00",
"db": "JVNDB",
"id": "JVNDB-2024-009984"
},
{
"date": "2025-03-19T16:15:26.387000",
"db": "NVD",
"id": "CVE-2024-41594"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0DrayTek\u00a0Corporation\u00a0 Vulnerability related to encryption strength in products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009984"
}
],
"trust": 0.8
}
}
VAR-202409-1117
Vulnerability from variot - Updated: 2025-03-20 23:06Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sPubKey parameter at dialin.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. DrayTek Corporation of vigor3910 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. DrayTek Vigor 3910 is a high-performance router for enterprise networks from DrayTek, a Chinese company. The vulnerability is caused by the sPubKey parameter of the dialin.cgi page failing to correctly verify the length of the input data
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202409-1117",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor3910",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.6"
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 0.8,
"vendor": "draytek",
"version": "vigor3910 firmware 4.3.2.6"
},
{
"model": "vigor",
"scope": "eq",
"trust": 0.6,
"vendor": "draytek",
"version": "3910v4.3.2.6"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39948"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008820"
},
{
"db": "NVD",
"id": "CVE-2024-46597"
}
]
},
"cve": "CVE-2024-46597",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2024-39948",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2024-46597",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2024-46597",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2024-46597",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-46597",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2024-46597",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2024-39948",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39948"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008820"
},
{
"db": "NVD",
"id": "CVE-2024-46597"
},
{
"db": "NVD",
"id": "CVE-2024-46597"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sPubKey parameter at dialin.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. DrayTek Corporation of vigor3910 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. DrayTek Vigor 3910 is a high-performance router for enterprise networks from DrayTek, a Chinese company. The vulnerability is caused by the sPubKey parameter of the dialin.cgi page failing to correctly verify the length of the input data",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-46597"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008820"
},
{
"db": "CNVD",
"id": "CNVD-2024-39948"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-46597",
"trust": 3.2
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008820",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2024-39948",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39948"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008820"
},
{
"db": "NVD",
"id": "CVE-2024-46597"
}
]
},
"id": "VAR-202409-1117",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39948"
}
],
"trust": 1.4333333000000001
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39948"
}
]
},
"last_update_date": "2025-03-20T23:06:35.941000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for DrayTek Vigor 3910 Buffer Overflow Vulnerability (CNVD-2024-39948)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/598451"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39948"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-120",
"trust": 1.0
},
{
"problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-008820"
},
{
"db": "NVD",
"id": "CVE-2024-46597"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.6,
"url": "https://ink-desk-28f.notion.site/draytek-vigor-3910-analysis-report-b3b23e150c4f4bab822c3c47fd7b9de9#11467dddc16f460db85a5e8d3a6665fb"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-46597"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39948"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008820"
},
{
"db": "NVD",
"id": "CVE-2024-46597"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2024-39948"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008820"
},
{
"db": "NVD",
"id": "CVE-2024-46597"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-39948"
},
{
"date": "2024-09-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-008820"
},
{
"date": "2024-09-18T15:15:18.400000",
"db": "NVD",
"id": "CVE-2024-46597"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-39948"
},
{
"date": "2024-09-25T01:19:00",
"db": "JVNDB",
"id": "JVNDB-2024-008820"
},
{
"date": "2025-03-19T16:15:28.327000",
"db": "NVD",
"id": "CVE-2024-46597"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "DrayTek\u00a0Corporation\u00a0 of \u00a0vigor3910\u00a0 Classic buffer overflow vulnerability in firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-008820"
}
],
"trust": 0.8
}
}
VAR-202409-1093
Vulnerability from variot - Updated: 2025-03-19 23:14Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sProfileName parameter at fextobj.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. DrayTek Corporation of vigor3910 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. DrayTek Vigor 3910 is a high-performance router for enterprise networks from DrayTek, a Chinese company. The vulnerability is caused by the sProfileName parameter of the fextobj.cgi page failing to properly verify the length of the input data
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202409-1093",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor3910",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.6"
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 0.8,
"vendor": "draytek",
"version": "vigor3910 firmware 4.3.2.6"
},
{
"model": "vigor",
"scope": "eq",
"trust": 0.6,
"vendor": "draytek",
"version": "3910v4.3.2.6"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39949"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008825"
},
{
"db": "NVD",
"id": "CVE-2024-46564"
}
]
},
"cve": "CVE-2024-46564",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2024-39949",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2024-46564",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2024-46564",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2024-46564",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-46564",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2024-46564",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2024-39949",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39949"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008825"
},
{
"db": "NVD",
"id": "CVE-2024-46564"
},
{
"db": "NVD",
"id": "CVE-2024-46564"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sProfileName parameter at fextobj.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. DrayTek Corporation of vigor3910 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. DrayTek Vigor 3910 is a high-performance router for enterprise networks from DrayTek, a Chinese company. The vulnerability is caused by the sProfileName parameter of the fextobj.cgi page failing to properly verify the length of the input data",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-46564"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008825"
},
{
"db": "CNVD",
"id": "CNVD-2024-39949"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-46564",
"trust": 3.2
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008825",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2024-39949",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39949"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008825"
},
{
"db": "NVD",
"id": "CVE-2024-46564"
}
]
},
"id": "VAR-202409-1093",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39949"
}
],
"trust": 1.4333333000000001
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39949"
}
]
},
"last_update_date": "2025-03-19T23:14:22.896000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for DrayTek Vigor 3910 Buffer Overflow Vulnerability (CNVD-2024-39949)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/598456"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39949"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-120",
"trust": 1.0
},
{
"problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-008825"
},
{
"db": "NVD",
"id": "CVE-2024-46564"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.6,
"url": "https://ink-desk-28f.notion.site/draytek-vigor-3910-analysis-report-b3b23e150c4f4bab822c3c47fd7b9de9#4ebd20d478124581b01338b89622363a"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-46564"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39949"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008825"
},
{
"db": "NVD",
"id": "CVE-2024-46564"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2024-39949"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008825"
},
{
"db": "NVD",
"id": "CVE-2024-46564"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-39949"
},
{
"date": "2024-09-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-008825"
},
{
"date": "2024-09-18T15:15:17.263000",
"db": "NVD",
"id": "CVE-2024-46564"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-39949"
},
{
"date": "2024-09-25T01:19:00",
"db": "JVNDB",
"id": "JVNDB-2024-008825"
},
{
"date": "2025-03-19T14:15:37.093000",
"db": "NVD",
"id": "CVE-2024-46564"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "DrayTek\u00a0Corporation\u00a0 of \u00a0vigor3910\u00a0 Classic buffer overflow vulnerability in firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-008825"
}
],
"trust": 0.8
}
}
VAR-202409-1248
Vulnerability from variot - Updated: 2025-03-19 23:11Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the iprofileidx parameter at dialin.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. DrayTek Corporation of vigor3910 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. DrayTek Vigor 3910 is a high-performance router for enterprise networks from DrayTek, a Chinese company. The vulnerability is caused by the iprofileidx parameter of the dialin.cgi page failing to properly verify the length of the input data
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202409-1248",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor3910",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.6"
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 0.8,
"vendor": "draytek",
"version": "vigor3910 firmware 4.3.2.6"
},
{
"model": "vigor",
"scope": "eq",
"trust": 0.6,
"vendor": "draytek",
"version": "3910v4.3.2.6"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39947"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008858"
},
{
"db": "NVD",
"id": "CVE-2024-46598"
}
]
},
"cve": "CVE-2024-46598",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2024-39947",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2024-46598",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2024-46598",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2024-46598",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-46598",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2024-46598",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2024-39947",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39947"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008858"
},
{
"db": "NVD",
"id": "CVE-2024-46598"
},
{
"db": "NVD",
"id": "CVE-2024-46598"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the iprofileidx parameter at dialin.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. DrayTek Corporation of vigor3910 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. DrayTek Vigor 3910 is a high-performance router for enterprise networks from DrayTek, a Chinese company. The vulnerability is caused by the iprofileidx parameter of the dialin.cgi page failing to properly verify the length of the input data",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-46598"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008858"
},
{
"db": "CNVD",
"id": "CNVD-2024-39947"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-46598",
"trust": 3.2
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008858",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2024-39947",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39947"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008858"
},
{
"db": "NVD",
"id": "CVE-2024-46598"
}
]
},
"id": "VAR-202409-1248",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39947"
}
],
"trust": 1.4333333000000001
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39947"
}
]
},
"last_update_date": "2025-03-19T23:11:49.213000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for DrayTek Vigor 3910 Buffer Overflow Vulnerability (CNVD-2024-39947)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/598446"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39947"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-120",
"trust": 1.0
},
{
"problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-008858"
},
{
"db": "NVD",
"id": "CVE-2024-46598"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.6,
"url": "https://ink-desk-28f.notion.site/draytek-vigor-3910-analysis-report-b3b23e150c4f4bab822c3c47fd7b9de9#0875f261ad5c4e1ba59448d49a261a99"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-46598"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39947"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008858"
},
{
"db": "NVD",
"id": "CVE-2024-46598"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2024-39947"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008858"
},
{
"db": "NVD",
"id": "CVE-2024-46598"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-39947"
},
{
"date": "2024-09-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-008858"
},
{
"date": "2024-09-18T15:15:18.453000",
"db": "NVD",
"id": "CVE-2024-46598"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-39947"
},
{
"date": "2024-09-25T01:53:00",
"db": "JVNDB",
"id": "JVNDB-2024-008858"
},
{
"date": "2025-03-18T15:15:55.530000",
"db": "NVD",
"id": "CVE-2024-46598"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "DrayTek\u00a0Corporation\u00a0 of \u00a0vigor3910\u00a0 Classic buffer overflow vulnerability in firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-008858"
}
],
"trust": 0.8
}
}
VAR-202410-0075
Vulnerability from variot - Updated: 2025-03-19 23:06Stored XSS, by authenticated users, is caused by poor sanitization of the Login Page Greeting message in DrayTek Vigor310 devices through 4.3.2.6. DrayTek Corporation of vigor3910 Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202410-0075",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.1"
},
{
"model": "vigor3912",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.6.1"
},
{
"model": "vigor2962",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.0.0"
},
{
"model": "vigor2862",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2865",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.2"
},
{
"model": "vigor2915",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor3220",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigorlte200",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor3910",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.0.0"
},
{
"model": "vigor2765",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor165",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.7"
},
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.1"
},
{
"model": "vigor2762",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2763",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2133",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2866",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.2"
},
{
"model": "vigor2926",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2766",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2925",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2620",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor1000b",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.1"
},
{
"model": "vigor1000b",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.0.0"
},
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor2832",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor166",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.7"
},
{
"model": "vigor2135",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2952",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2860",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor1000b",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 0.8,
"vendor": "draytek",
"version": "vigor3910 firmware 4.3.2.8"
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 0.8,
"vendor": "draytek",
"version": "vigor3910 firmware 4.4.0.0 that\u0027s all 4.4.3.1"
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009832"
},
{
"db": "NVD",
"id": "CVE-2024-41587"
}
]
},
"cve": "CVE-2024-41587",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 2.3,
"id": "CVE-2024-41587",
"impactScore": 2.7,
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"trust": 2.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 5.4,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "CVE-2024-41587",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "Low",
"scope": "Changed",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2024-41587",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-41587",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2024-41587",
"trust": 0.8,
"value": "Medium"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009832"
},
{
"db": "NVD",
"id": "CVE-2024-41587"
},
{
"db": "NVD",
"id": "CVE-2024-41587"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Stored XSS, by authenticated users, is caused by poor sanitization of the Login Page Greeting message in DrayTek Vigor310 devices through 4.3.2.6. DrayTek Corporation of vigor3910 Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-41587"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-009832"
}
],
"trust": 1.62
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-41587",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2024-009832",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009832"
},
{
"db": "NVD",
"id": "CVE-2024-41587"
}
]
},
"id": "VAR-202410-0075",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.6666667
},
"last_update_date": "2025-03-19T23:06:30.760000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-79",
"trust": 1.0
},
{
"problemtype": "Cross-site scripting (CWE-79) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009832"
},
{
"db": "NVD",
"id": "CVE-2024-41587"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "https://www.forescout.com/resources/draybreak-draytek-research/"
},
{
"trust": 1.0,
"url": "https://www.forescout.com/resources/draytek14-vulnerabilities"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-41587"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009832"
},
{
"db": "NVD",
"id": "CVE-2024-41587"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009832"
},
{
"db": "NVD",
"id": "CVE-2024-41587"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-009832"
},
{
"date": "2024-10-03T19:15:04.310000",
"db": "NVD",
"id": "CVE-2024-41587"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-07T03:05:00",
"db": "JVNDB",
"id": "JVNDB-2024-009832"
},
{
"date": "2025-03-18T16:15:22.733000",
"db": "NVD",
"id": "CVE-2024-41587"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "DrayTek\u00a0Corporation\u00a0 of \u00a0vigor3910\u00a0 Cross-site scripting vulnerability in firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009832"
}
],
"trust": 0.8
}
}
VAR-202409-1055
Vulnerability from variot - Updated: 2025-03-19 23:02Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sBPA_UsrNme parameter at inet15.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. DrayTek Corporation of vigor3910 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. DrayTek Vigor 3910 is a high-performance router for enterprise networks from DrayTek, a Chinese company. The vulnerability is caused by the sBPA_UsrNme parameter of the inet15.cgi page failing to properly verify the length of the input data
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202409-1055",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor3910",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.6"
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 0.8,
"vendor": "draytek",
"version": "vigor3910 firmware 4.3.2.6"
},
{
"model": "vigor",
"scope": "eq",
"trust": 0.6,
"vendor": "draytek",
"version": "3910v4.3.2.6"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39952"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008948"
},
{
"db": "NVD",
"id": "CVE-2024-46559"
}
]
},
"cve": "CVE-2024-46559",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2024-39952",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2024-46559",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2024-46559",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2024-46559",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-46559",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2024-46559",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2024-39952",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39952"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008948"
},
{
"db": "NVD",
"id": "CVE-2024-46559"
},
{
"db": "NVD",
"id": "CVE-2024-46559"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sBPA_UsrNme parameter at inet15.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. DrayTek Corporation of vigor3910 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. DrayTek Vigor 3910 is a high-performance router for enterprise networks from DrayTek, a Chinese company. The vulnerability is caused by the sBPA_UsrNme parameter of the inet15.cgi page failing to properly verify the length of the input data",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-46559"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008948"
},
{
"db": "CNVD",
"id": "CNVD-2024-39952"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-46559",
"trust": 3.2
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008948",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2024-39952",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39952"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008948"
},
{
"db": "NVD",
"id": "CVE-2024-46559"
}
]
},
"id": "VAR-202409-1055",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39952"
}
],
"trust": 1.4333333000000001
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39952"
}
]
},
"last_update_date": "2025-03-19T23:02:11.537000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for DrayTek Vigor 3910 Buffer Overflow Vulnerability (CNVD-2024-39952)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/598471"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39952"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-120",
"trust": 1.0
},
{
"problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-008948"
},
{
"db": "NVD",
"id": "CVE-2024-46559"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.6,
"url": "https://ink-desk-28f.notion.site/draytek-vigor-3910-analysis-report-b3b23e150c4f4bab822c3c47fd7b9de9#acee48e159494c479aecc1bfa87f0d83"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-46559"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39952"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008948"
},
{
"db": "NVD",
"id": "CVE-2024-46559"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2024-39952"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008948"
},
{
"db": "NVD",
"id": "CVE-2024-46559"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-39952"
},
{
"date": "2024-09-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-008948"
},
{
"date": "2024-09-18T15:15:17.097000",
"db": "NVD",
"id": "CVE-2024-46559"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-39952"
},
{
"date": "2024-09-25T06:07:00",
"db": "JVNDB",
"id": "JVNDB-2024-008948"
},
{
"date": "2025-03-18T17:15:43.193000",
"db": "NVD",
"id": "CVE-2024-46559"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "DrayTek\u00a0Corporation\u00a0 of \u00a0vigor3910\u00a0 Classic buffer overflow vulnerability in firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-008948"
}
],
"trust": 0.8
}
}
VAR-202409-1193
Vulnerability from variot - Updated: 2025-03-19 23:00Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the extRadSrv2 parameter at cgiapp.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. DrayTek Corporation of vigor3910 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. DrayTek Vigor 3910 is a high-performance router for enterprise networks from DrayTek, a Chinese company. The vulnerability is caused by the extRadSrv2 parameter of the cgiapp.cgi page failing to properly verify the length of the input data
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202409-1193",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor3910",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.6"
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 0.8,
"vendor": "draytek",
"version": "vigor3910 firmware 4.3.2.6"
},
{
"model": "vigor",
"scope": "eq",
"trust": 0.6,
"vendor": "draytek",
"version": "3910v4.3.2.6"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39944"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008955"
},
{
"db": "NVD",
"id": "CVE-2024-46583"
}
]
},
"cve": "CVE-2024-46583",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2024-39944",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2024-46583",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2024-46583",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2024-46583",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-46583",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2024-46583",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2024-39944",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39944"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008955"
},
{
"db": "NVD",
"id": "CVE-2024-46583"
},
{
"db": "NVD",
"id": "CVE-2024-46583"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the extRadSrv2 parameter at cgiapp.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. DrayTek Corporation of vigor3910 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. DrayTek Vigor 3910 is a high-performance router for enterprise networks from DrayTek, a Chinese company. The vulnerability is caused by the extRadSrv2 parameter of the cgiapp.cgi page failing to properly verify the length of the input data",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-46583"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008955"
},
{
"db": "CNVD",
"id": "CNVD-2024-39944"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-46583",
"trust": 3.2
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008955",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2024-39944",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39944"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008955"
},
{
"db": "NVD",
"id": "CVE-2024-46583"
}
]
},
"id": "VAR-202409-1193",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39944"
}
],
"trust": 1.4333333000000001
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39944"
}
]
},
"last_update_date": "2025-03-19T23:00:03.388000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for DrayTek Vigor 3910 Buffer Overflow Vulnerability (CNVD-2024-39944)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/598431"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39944"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-120",
"trust": 1.0
},
{
"problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-008955"
},
{
"db": "NVD",
"id": "CVE-2024-46583"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.6,
"url": "https://ink-desk-28f.notion.site/draytek-vigor-3910-analysis-report-b3b23e150c4f4bab822c3c47fd7b9de9#0f15f2bf2eb448c381255850e43cf96a"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-46583"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39944"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008955"
},
{
"db": "NVD",
"id": "CVE-2024-46583"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2024-39944"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008955"
},
{
"db": "NVD",
"id": "CVE-2024-46583"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-39944"
},
{
"date": "2024-09-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-008955"
},
{
"date": "2024-09-18T15:15:17.723000",
"db": "NVD",
"id": "CVE-2024-46583"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-39944"
},
{
"date": "2024-09-25T06:14:00",
"db": "JVNDB",
"id": "JVNDB-2024-008955"
},
{
"date": "2025-03-18T15:15:55.090000",
"db": "NVD",
"id": "CVE-2024-46583"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "DrayTek\u00a0Corporation\u00a0 of \u00a0vigor3910\u00a0 Classic buffer overflow vulnerability in firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-008955"
}
],
"trust": 0.8
}
}
VAR-202409-1196
Vulnerability from variot - Updated: 2025-03-18 23:31Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the trapcomm parameter at cgiswm.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. DrayTek Corporation of vigor3910 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. DrayTek Vigor 3910 is a high-performance router for enterprise networks from DrayTek, a Chinese company. The vulnerability is caused by the trapcomm parameter of the cgiswm.cgi page failing to properly verify the length of the input data
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202409-1196",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor3910",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.6"
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 0.8,
"vendor": "draytek",
"version": "vigor3910 firmware 4.3.2.6"
},
{
"model": "vigor",
"scope": "eq",
"trust": 0.6,
"vendor": "draytek",
"version": "3910v4.3.2.6"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39945"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008859"
},
{
"db": "NVD",
"id": "CVE-2024-46593"
}
]
},
"cve": "CVE-2024-46593",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2024-39945",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2024-46593",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2024-46593",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2024-46593",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-46593",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2024-46593",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2024-39945",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39945"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008859"
},
{
"db": "NVD",
"id": "CVE-2024-46593"
},
{
"db": "NVD",
"id": "CVE-2024-46593"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the trapcomm parameter at cgiswm.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. DrayTek Corporation of vigor3910 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. DrayTek Vigor 3910 is a high-performance router for enterprise networks from DrayTek, a Chinese company. The vulnerability is caused by the trapcomm parameter of the cgiswm.cgi page failing to properly verify the length of the input data",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-46593"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008859"
},
{
"db": "CNVD",
"id": "CNVD-2024-39945"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-46593",
"trust": 3.2
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008859",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2024-39945",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39945"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008859"
},
{
"db": "NVD",
"id": "CVE-2024-46593"
}
]
},
"id": "VAR-202409-1196",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39945"
}
],
"trust": 1.4333333000000001
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39945"
}
]
},
"last_update_date": "2025-03-18T23:31:12.505000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for DrayTek Vigor 3910 Buffer Overflow Vulnerability (CNVD-2024-39945)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/598436"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39945"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-120",
"trust": 1.0
},
{
"problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-008859"
},
{
"db": "NVD",
"id": "CVE-2024-46593"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.6,
"url": "https://ink-desk-28f.notion.site/draytek-vigor-3910-analysis-report-b3b23e150c4f4bab822c3c47fd7b9de9#f85d41a6875a4853be9a3c457bc81a33"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-46593"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39945"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008859"
},
{
"db": "NVD",
"id": "CVE-2024-46593"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2024-39945"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008859"
},
{
"db": "NVD",
"id": "CVE-2024-46593"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-39945"
},
{
"date": "2024-09-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-008859"
},
{
"date": "2024-09-18T15:15:18.220000",
"db": "NVD",
"id": "CVE-2024-46593"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-39945"
},
{
"date": "2024-09-25T01:54:00",
"db": "JVNDB",
"id": "JVNDB-2024-008859"
},
{
"date": "2025-03-17T18:15:18.413000",
"db": "NVD",
"id": "CVE-2024-46593"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "DrayTek\u00a0Corporation\u00a0 of \u00a0vigor3910\u00a0 Classic buffer overflow vulnerability in firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-008859"
}
],
"trust": 0.8
}
}
VAR-202409-1080
Vulnerability from variot - Updated: 2025-03-18 23:27Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the CGIbyFieldName parameter at chglog.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. DrayTek Corporation of vigor3910 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. DrayTek Vigor 3910 is a high-performance router for enterprise networks from DrayTek, a Chinese company. The vulnerability is caused by the CGIbyFieldName parameter of the chglog.cgi page failing to properly verify the length of the input data
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202409-1080",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor3910",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.6"
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 0.8,
"vendor": "draytek",
"version": "vigor3910 firmware 4.3.2.6"
},
{
"model": "vigor",
"scope": "eq",
"trust": 0.6,
"vendor": "draytek",
"version": "3910v4.3.2.6"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39946"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008842"
},
{
"db": "NVD",
"id": "CVE-2024-46550"
}
]
},
"cve": "CVE-2024-46550",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2024-39946",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2024-46550",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2024-46550",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2024-46550",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-46550",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2024-46550",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2024-39946",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39946"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008842"
},
{
"db": "NVD",
"id": "CVE-2024-46550"
},
{
"db": "NVD",
"id": "CVE-2024-46550"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the CGIbyFieldName parameter at chglog.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. DrayTek Corporation of vigor3910 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. DrayTek Vigor 3910 is a high-performance router for enterprise networks from DrayTek, a Chinese company. The vulnerability is caused by the CGIbyFieldName parameter of the chglog.cgi page failing to properly verify the length of the input data",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-46550"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008842"
},
{
"db": "CNVD",
"id": "CNVD-2024-39946"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-46550",
"trust": 3.2
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008842",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2024-39946",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39946"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008842"
},
{
"db": "NVD",
"id": "CVE-2024-46550"
}
]
},
"id": "VAR-202409-1080",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39946"
}
],
"trust": 1.4333333000000001
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39946"
}
]
},
"last_update_date": "2025-03-18T23:27:58.856000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for DrayTek Vigor 3910 Buffer Overflow Vulnerability (CNVD-2024-39946)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/598441"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39946"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-120",
"trust": 1.0
},
{
"problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-008842"
},
{
"db": "NVD",
"id": "CVE-2024-46550"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.6,
"url": "https://ink-desk-28f.notion.site/draytek-vigor-3910-analysis-report-b3b23e150c4f4bab822c3c47fd7b9de9#bffdd8897d944a77834b865d9326a1d7"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-46550"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39946"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008842"
},
{
"db": "NVD",
"id": "CVE-2024-46550"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2024-39946"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008842"
},
{
"db": "NVD",
"id": "CVE-2024-46550"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-39946"
},
{
"date": "2024-09-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-008842"
},
{
"date": "2024-09-18T15:15:16.533000",
"db": "NVD",
"id": "CVE-2024-46550"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-39946"
},
{
"date": "2024-09-25T01:50:00",
"db": "JVNDB",
"id": "JVNDB-2024-008842"
},
{
"date": "2025-03-17T19:15:22.587000",
"db": "NVD",
"id": "CVE-2024-46550"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "DrayTek\u00a0Corporation\u00a0 of \u00a0vigor3910\u00a0 Classic buffer overflow vulnerability in firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-008842"
}
],
"trust": 0.8
}
}
VAR-202409-1232
Vulnerability from variot - Updated: 2025-03-17 23:35Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sPPPSrvNm parameter at fwuser.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. DrayTek Corporation of vigor3910 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. DrayTek Vigor 3910 is a high-performance router for enterprise networks from DrayTek, a Chinese company. The vulnerability is caused by the sPPPSrvNm parameter of the fwuser.cgi page failing to properly verify the length of the input data
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202409-1232",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor3910",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.6"
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 0.8,
"vendor": "draytek",
"version": "vigor3910 firmware 4.3.2.6"
},
{
"model": "vigor",
"scope": "eq",
"trust": 0.6,
"vendor": "draytek",
"version": "3910v4.3.2.6"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39950"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008877"
},
{
"db": "NVD",
"id": "CVE-2024-46571"
}
]
},
"cve": "CVE-2024-46571",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2024-39950",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2024-46571",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2024-46571",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2024-46571",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-46571",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2024-46571",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2024-39950",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39950"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008877"
},
{
"db": "NVD",
"id": "CVE-2024-46571"
},
{
"db": "NVD",
"id": "CVE-2024-46571"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sPPPSrvNm parameter at fwuser.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. DrayTek Corporation of vigor3910 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. DrayTek Vigor 3910 is a high-performance router for enterprise networks from DrayTek, a Chinese company. The vulnerability is caused by the sPPPSrvNm parameter of the fwuser.cgi page failing to properly verify the length of the input data",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-46571"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008877"
},
{
"db": "CNVD",
"id": "CNVD-2024-39950"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-46571",
"trust": 3.2
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008877",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2024-39950",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39950"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008877"
},
{
"db": "NVD",
"id": "CVE-2024-46571"
}
]
},
"id": "VAR-202409-1232",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39950"
}
],
"trust": 1.4333333000000001
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39950"
}
]
},
"last_update_date": "2025-03-17T23:35:19.325000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for DrayTek Vigor 3910 Buffer Overflow Vulnerability (CNVD-2024-39950)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/598461"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39950"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-120",
"trust": 1.0
},
{
"problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-008877"
},
{
"db": "NVD",
"id": "CVE-2024-46571"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.6,
"url": "https://ink-desk-28f.notion.site/draytek-vigor-3910-analysis-report-b3b23e150c4f4bab822c3c47fd7b9de9#b325c78d0d4643b6a2e7703a811f1dd5"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-46571"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39950"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008877"
},
{
"db": "NVD",
"id": "CVE-2024-46571"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2024-39950"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008877"
},
{
"db": "NVD",
"id": "CVE-2024-46571"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-39950"
},
{
"date": "2024-09-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-008877"
},
{
"date": "2024-09-18T15:15:17.530000",
"db": "NVD",
"id": "CVE-2024-46571"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-39950"
},
{
"date": "2024-09-25T02:31:00",
"db": "JVNDB",
"id": "JVNDB-2024-008877"
},
{
"date": "2025-03-17T14:15:19.380000",
"db": "NVD",
"id": "CVE-2024-46571"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "DrayTek\u00a0Corporation\u00a0 of \u00a0vigor3910\u00a0 Classic buffer overflow vulnerability in firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-008877"
}
],
"trust": 0.8
}
}
VAR-202410-0186
Vulnerability from variot - Updated: 2025-03-15 23:24DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS. vigor2620 firmware, vigor2915 firmware, vigor2866 firmware etc. DrayTek Corporation A cross-site scripting vulnerability exists in the product.Information may be obtained and information may be tampered with
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202410-0186",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.1"
},
{
"model": "vigorlte200",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2952",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor166",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.7"
},
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor2762",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2926",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2866",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.2"
},
{
"model": "vigor2832",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2865",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.2"
},
{
"model": "vigor2135",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2620",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2766",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor3910",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.0.0"
},
{
"model": "vigor3220",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor1000b",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor1000b",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.1"
},
{
"model": "vigor3912",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.6.1"
},
{
"model": "vigor2862",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2925",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor165",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.7"
},
{
"model": "vigor2763",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor1000b",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.0.0"
},
{
"model": "vigor2962",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.0.0"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.1"
},
{
"model": "vigor2860",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2133",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2915",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor2765",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2766",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2866",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2765",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2865",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor165",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2962",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2133",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2762",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigorlte200",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor1000b",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2915",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3912",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2620",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2763",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2135",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor166",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009985"
},
{
"db": "NVD",
"id": "CVE-2024-41591"
}
]
},
"cve": "CVE-2024-41591",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 2.8,
"id": "CVE-2024-41591",
"impactScore": 2.7,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"trust": 2.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 6.1,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "CVE-2024-41591",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Changed",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2024-41591",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-41591",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2024-41591",
"trust": 0.8,
"value": "Medium"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009985"
},
{
"db": "NVD",
"id": "CVE-2024-41591"
},
{
"db": "NVD",
"id": "CVE-2024-41591"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS. vigor2620 firmware, vigor2915 firmware, vigor2866 firmware etc. DrayTek Corporation A cross-site scripting vulnerability exists in the product.Information may be obtained and information may be tampered with",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-41591"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-009985"
}
],
"trust": 1.62
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-41591",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2024-009985",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009985"
},
{
"db": "NVD",
"id": "CVE-2024-41591"
}
]
},
"id": "VAR-202410-0186",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.6666667
},
"last_update_date": "2025-03-15T23:24:46.464000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-79",
"trust": 1.0
},
{
"problemtype": "Cross-site scripting (CWE-79) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009985"
},
{
"db": "NVD",
"id": "CVE-2024-41591"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "https://www.forescout.com/resources/draybreak-draytek-research/"
},
{
"trust": 1.0,
"url": "https://www.forescout.com/resources/draytek14-vulnerabilities"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-41591"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009985"
},
{
"db": "NVD",
"id": "CVE-2024-41591"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009985"
},
{
"db": "NVD",
"id": "CVE-2024-41591"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-009985"
},
{
"date": "2024-10-03T19:15:04.560000",
"db": "NVD",
"id": "CVE-2024-41591"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T01:14:00",
"db": "JVNDB",
"id": "JVNDB-2024-009985"
},
{
"date": "2025-03-14T16:15:34.730000",
"db": "NVD",
"id": "CVE-2024-41591"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0DrayTek\u00a0Corporation\u00a0 Cross-site scripting vulnerability in the product",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009985"
}
],
"trust": 0.8
}
}
VAR-202409-1236
Vulnerability from variot - Updated: 2025-03-15 23:22Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the AControlIp1 parameter at acontrol.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. DrayTek Corporation of vigor3910 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. DrayTek Vigor 3910 is a high-performance router for enterprise networks from DrayTek, a Chinese company. The vulnerability is caused by the AControlIp1 parameter of the acontrol.cgi page failing to properly verify the length of the input data
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202409-1236",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor3910",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.6"
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 0.8,
"vendor": "draytek",
"version": "vigor3910 firmware 4.3.2.6"
},
{
"model": "vigor",
"scope": "eq",
"trust": 0.6,
"vendor": "draytek",
"version": "3910v4.3.2.6"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39943"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008838"
},
{
"db": "NVD",
"id": "CVE-2024-46584"
}
]
},
"cve": "CVE-2024-46584",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2024-39943",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2024-46584",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2024-46584",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2024-46584",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-46584",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2024-46584",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2024-39943",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39943"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008838"
},
{
"db": "NVD",
"id": "CVE-2024-46584"
},
{
"db": "NVD",
"id": "CVE-2024-46584"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the AControlIp1 parameter at acontrol.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. DrayTek Corporation of vigor3910 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. DrayTek Vigor 3910 is a high-performance router for enterprise networks from DrayTek, a Chinese company. The vulnerability is caused by the AControlIp1 parameter of the acontrol.cgi page failing to properly verify the length of the input data",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-46584"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008838"
},
{
"db": "CNVD",
"id": "CNVD-2024-39943"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-46584",
"trust": 3.2
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008838",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2024-39943",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39943"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008838"
},
{
"db": "NVD",
"id": "CVE-2024-46584"
}
]
},
"id": "VAR-202409-1236",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39943"
}
],
"trust": 1.4333333000000001
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39943"
}
]
},
"last_update_date": "2025-03-15T23:22:19.772000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for DrayTek Vigor 3910 Buffer Overflow Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/598426"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39943"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-120",
"trust": 1.0
},
{
"problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-008838"
},
{
"db": "NVD",
"id": "CVE-2024-46584"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.6,
"url": "https://ink-desk-28f.notion.site/draytek-vigor-3910-analysis-report-b3b23e150c4f4bab822c3c47fd7b9de9#20fb6e1bcec049728e6319d9da46416d"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-46584"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39943"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008838"
},
{
"db": "NVD",
"id": "CVE-2024-46584"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2024-39943"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008838"
},
{
"db": "NVD",
"id": "CVE-2024-46584"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-39943"
},
{
"date": "2024-09-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-008838"
},
{
"date": "2024-09-18T15:15:17.790000",
"db": "NVD",
"id": "CVE-2024-46584"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-39943"
},
{
"date": "2024-09-25T01:50:00",
"db": "JVNDB",
"id": "JVNDB-2024-008838"
},
{
"date": "2025-03-14T16:15:36.087000",
"db": "NVD",
"id": "CVE-2024-46584"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "DrayTek\u00a0Corporation\u00a0 of \u00a0vigor3910\u00a0 Classic buffer overflow vulnerability in firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-008838"
}
],
"trust": 0.8
}
}
VAR-202410-0281
Vulnerability from variot - Updated: 2025-03-14 23:02DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow. vigor3912 firmware, vigor2962 firmware, vigor3910 firmware etc. DrayTek Corporation The product contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202410-0281",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor2865",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.2"
},
{
"model": "vigor2620",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor165",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.7"
},
{
"model": "vigor2862",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2866",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.2"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.1"
},
{
"model": "vigor2762",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor3220",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2763",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2915",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2925",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor166",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.7"
},
{
"model": "vigorlte200",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2926",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2766",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor3912",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.6.1"
},
{
"model": "vigor2133",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor1000b",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor2860",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor1000b",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.0.0"
},
{
"model": "vigor3910",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.0.0"
},
{
"model": "vigor1000b",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.1"
},
{
"model": "vigor2952",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2135",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.8"
},
{
"model": "vigor2765",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.5.3"
},
{
"model": "vigor2832",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "*"
},
{
"model": "vigor2962",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.0.0"
},
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.4.3.1"
},
{
"model": "vigor2766",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2866",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2765",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2865",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor165",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2962",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2133",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2762",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigorlte200",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor1000b",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2915",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3912",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2620",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2763",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor2135",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor166",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009968"
},
{
"db": "NVD",
"id": "CVE-2024-41593"
}
]
},
"cve": "CVE-2024-41593",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2024-41593",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2024-41593",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2024-41593",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-41593",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2024-41593",
"trust": 0.8,
"value": "Critical"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009968"
},
{
"db": "NVD",
"id": "CVE-2024-41593"
},
{
"db": "NVD",
"id": "CVE-2024-41593"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow. vigor3912 firmware, vigor2962 firmware, vigor3910 firmware etc. DrayTek Corporation The product contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-41593"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-009968"
}
],
"trust": 1.62
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-41593",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2024-009968",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009968"
},
{
"db": "NVD",
"id": "CVE-2024-41593"
}
]
},
"id": "VAR-202410-0281",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.6666667
},
"last_update_date": "2025-03-14T23:02:25.174000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-787",
"trust": 1.0
},
{
"problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009968"
},
{
"db": "NVD",
"id": "CVE-2024-41593"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "https://www.forescout.com/resources/draybreak-draytek-research/"
},
{
"trust": 1.0,
"url": "https://www.forescout.com/resources/draytek14-vulnerabilities"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-41593"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009968"
},
{
"db": "NVD",
"id": "CVE-2024-41593"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009968"
},
{
"db": "NVD",
"id": "CVE-2024-41593"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-009968"
},
{
"date": "2024-10-03T19:15:04.740000",
"db": "NVD",
"id": "CVE-2024-41593"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T00:45:00",
"db": "JVNDB",
"id": "JVNDB-2024-009968"
},
{
"date": "2025-03-13T19:15:47.260000",
"db": "NVD",
"id": "CVE-2024-41593"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0DrayTek\u00a0Corporation\u00a0 Out-of-bounds write vulnerabilities in the product",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-009968"
}
],
"trust": 0.8
}
}
VAR-202409-1092
Vulnerability from variot - Updated: 2025-03-14 22:55Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sBPA_Pwd parameter at inet15.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. DrayTek Corporation of vigor3910 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. DrayTek Vigor 3910 is a high-performance router for enterprise networks from DrayTek, a Chinese company. The vulnerability is caused by the sBPA_Pwd parameter of the inet15.cgi page failing to properly verify the length of the input data
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202409-1092",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor3910",
"scope": "eq",
"trust": 1.0,
"vendor": "draytek",
"version": "4.3.2.6"
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": null,
"trust": 0.8,
"vendor": "draytek",
"version": null
},
{
"model": "vigor3910",
"scope": "eq",
"trust": 0.8,
"vendor": "draytek",
"version": "vigor3910 firmware 4.3.2.6"
},
{
"model": "vigor",
"scope": "eq",
"trust": 0.6,
"vendor": "draytek",
"version": "3910v4.3.2.6"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39951"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008827"
},
{
"db": "NVD",
"id": "CVE-2024-46551"
}
]
},
"cve": "CVE-2024-46551",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2024-39951",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2024-46551",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2024-46551",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2024-46551",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-46551",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2024-46551",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2024-39951",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39951"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008827"
},
{
"db": "NVD",
"id": "CVE-2024-46551"
},
{
"db": "NVD",
"id": "CVE-2024-46551"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sBPA_Pwd parameter at inet15.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. DrayTek Corporation of vigor3910 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. DrayTek Vigor 3910 is a high-performance router for enterprise networks from DrayTek, a Chinese company. The vulnerability is caused by the sBPA_Pwd parameter of the inet15.cgi page failing to properly verify the length of the input data",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-46551"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008827"
},
{
"db": "CNVD",
"id": "CNVD-2024-39951"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-46551",
"trust": 3.2
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008827",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2024-39951",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39951"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008827"
},
{
"db": "NVD",
"id": "CVE-2024-46551"
}
]
},
"id": "VAR-202409-1092",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39951"
}
],
"trust": 1.4333333000000001
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39951"
}
]
},
"last_update_date": "2025-03-14T22:55:44.332000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for DrayTek Vigor 3910 Buffer Overflow Vulnerability (CNVD-2024-39951)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/598466"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39951"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-120",
"trust": 1.0
},
{
"problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-008827"
},
{
"db": "NVD",
"id": "CVE-2024-46551"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.6,
"url": "https://ink-desk-28f.notion.site/draytek-vigor-3910-analysis-report-b3b23e150c4f4bab822c3c47fd7b9de9#aabdeced2a5e407ba3b3c0d318af0a29"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-46551"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-39951"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008827"
},
{
"db": "NVD",
"id": "CVE-2024-46551"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2024-39951"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-008827"
},
{
"db": "NVD",
"id": "CVE-2024-46551"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-39951"
},
{
"date": "2024-09-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-008827"
},
{
"date": "2024-09-18T15:15:16.590000",
"db": "NVD",
"id": "CVE-2024-46551"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-10-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-39951"
},
{
"date": "2024-09-25T01:20:00",
"db": "JVNDB",
"id": "JVNDB-2024-008827"
},
{
"date": "2025-03-13T20:15:22.987000",
"db": "NVD",
"id": "CVE-2024-46551"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "DrayTek\u00a0Corporation\u00a0 of \u00a0vigor3910\u00a0 Classic buffer overflow vulnerability in firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-008827"
}
],
"trust": 0.8
}
}
VAR-202306-0072
Vulnerability from variot - Updated: 2025-01-10 23:14Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202306-0072",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vigor2832n",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2763ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor167",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigorswitch pq2200xb",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "2.6.7"
},
{
"model": "vigor2862b",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2620ln",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2766ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2927vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2927ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2862vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2866ax",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor165",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor3910",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2927ax",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigorap 1060c",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "1.4.0"
},
{
"model": "vigor166",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2862ln",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigorswitch g1085",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "2.6.7"
},
{
"model": "vigor2766vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigorswitch fx2120",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "2.6.7"
},
{
"model": "vigorswitch p1282",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "2.6.7"
},
{
"model": "vigor2862ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2620l",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigorap 960c",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "1.4.0"
},
{
"model": "vigor2766ac",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigorap 903",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "1.4.0"
},
{
"model": "vigor2832n",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor167",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2865vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigorswitch q2200x",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "2.6.7"
},
{
"model": "vigor2765ax",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2135ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2862l",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor130",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2766ax",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2926 plus",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2862ac",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2135vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigorap 918r",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "1.4.0"
},
{
"model": "vigor2866ax",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2865ax",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor1000b",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2135ax",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2927l",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2866lac",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2862n",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigorswitch g2540xs",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "2.6.7"
},
{
"model": "vigor2866ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2765ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2915ac",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2862l",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2766ax",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2927f",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2927lac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2865lac",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor166",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigorswitch g1282",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "2.6.7"
},
{
"model": "vigor2862lac",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2865l",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2962",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigorlte 200n",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2862b",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2862bn",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2862n",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2765vac",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2763ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2620ln",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2866l",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2865ac",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2915ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigorswitch g2100",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "2.6.7"
},
{
"model": "vigor2620ln",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigorswitch p2280x",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "2.6.7"
},
{
"model": "vigor2926 plus",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2927vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2962",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2620l",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2862b",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2927ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "myvigor",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "2.3.2"
},
{
"model": "vigor2862vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2862lac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2865l",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2135fvac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigorswitch p2540xs",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "2.6.7"
},
{
"model": "vigor2766vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2866vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2862bn",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2927ax",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2765vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigorswitch p2100",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "2.6.7"
},
{
"model": "vigor2866lac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2862ln",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2135vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2832n",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor167",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2865ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor1000b",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigorap 1000c",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "1.4.0"
},
{
"model": "vigor2135ax",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2927l",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2865lac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigorswitch g2280x",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "2.6.7"
},
{
"model": "vigorap 912c",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "1.4.0"
},
{
"model": "vigor165",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigorlte 200n",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2765ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2866ax",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2866ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2765ax",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2135ac",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor130",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor3910",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2135vac",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigorswitch g2121",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "2.6.7"
},
{
"model": "vigor2865ax",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2927ax",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigorswitch pq2121x",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "2.6.7"
},
{
"model": "vigor2135ax",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2927l",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor166",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2766ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2862ln",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2927f",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2866ac",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2765ac",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2866l",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2927lac",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2865vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2862ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2765ax",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2135ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor130",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2926 plus",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigorap 906",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "1.4.0"
},
{
"model": "vigor2915ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2135fvac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2865ax",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2620l",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2866vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2763ac",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2866l",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2862l",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2766ax",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2866lac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2927vac",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2862lac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2865l",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2927f",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2865vac",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2927ac",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2862vac",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2927lac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigorswitch g1080",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "2.6.7"
},
{
"model": "vigor2862bn",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2865lac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigor2862n",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2135fvac",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2765vac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
},
{
"model": "vigor2766vac",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2866vac",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor165",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigorlte 200n",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "3.9.6"
},
{
"model": "vigorswitch q2121x",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "2.6.7"
},
{
"model": "vigor1000b",
"scope": "gte",
"trust": 1.0,
"vendor": "draytek",
"version": "4.0.0"
},
{
"model": "vigor2865ac",
"scope": "lt",
"trust": 1.0,
"vendor": "draytek",
"version": "4.2.4"
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2023-33778"
}
]
},
"cve": "CVE-2023-33778",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2023-33778",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2023-33778",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2023-33778",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "CNNVD",
"id": "CNNVD-202306-003",
"trust": 0.6,
"value": "CRITICAL"
}
]
}
],
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202306-003"
},
{
"db": "NVD",
"id": "CVE-2023-33778"
},
{
"db": "NVD",
"id": "CVE-2023-33778"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website",
"sources": [
{
"db": "NVD",
"id": "CVE-2023-33778"
},
{
"db": "VULMON",
"id": "CVE-2023-33778"
}
],
"trust": 0.99
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2023-33778",
"trust": 1.7
},
{
"db": "CNNVD",
"id": "CNNVD-202306-003",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2023-33778",
"trust": 0.1
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2023-33778"
},
{
"db": "CNNVD",
"id": "CNNVD-202306-003"
},
{
"db": "NVD",
"id": "CVE-2023-33778"
}
]
},
"id": "VAR-202306-0072",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 1.0
},
"last_update_date": "2025-01-10T23:14:18.414000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-798",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2023-33778"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "https://gist.github.com/ji4n1ng/6d028709d39458f5ab95b3ea211225ef"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2023-33778/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2023-33778"
},
{
"db": "CNNVD",
"id": "CNNVD-202306-003"
},
{
"db": "NVD",
"id": "CVE-2023-33778"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULMON",
"id": "CVE-2023-33778"
},
{
"db": "CNNVD",
"id": "CNNVD-202306-003"
},
{
"db": "NVD",
"id": "CVE-2023-33778"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2023-06-01T00:00:00",
"db": "VULMON",
"id": "CVE-2023-33778"
},
{
"date": "2023-06-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202306-003"
},
{
"date": "2023-06-01T04:15:10.313000",
"db": "NVD",
"id": "CVE-2023-33778"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2023-06-01T00:00:00",
"db": "VULMON",
"id": "CVE-2023-33778"
},
{
"date": "2023-06-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202306-003"
},
{
"date": "2025-01-09T18:15:26.790000",
"db": "NVD",
"id": "CVE-2023-33778"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202306-003"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Draytek Vigor Routers Trust Management Issue Vulnerability",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202306-003"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "trust management problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202306-003"
}
],
"trust": 0.6
}
}