Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
draytek vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2020-10823
A stack-based buffer overflow in /cgi-bin/activate.cgi through var parameter on Draytek Vigor3900, Vigor2960, and Vigor300B devices prior to 1.5.1 allows remote malicious users to achieve code execution via a remote HTTP request (issue 1 of 3).
Draytek Vigor300b Firmware
Draytek Vigor3900 Firmware
Draytek Vigor2960 Firmware
668
VMScore
CVE-2020-10824
A stack-based buffer overflow in /cgi-bin/activate.cgi through ticket parameter on Draytek Vigor3900, Vigor2960, and Vigor300B devices prior to 1.5.1 allows remote malicious users to achieve code execution via a remote HTTP request (issue 2 of 3).
Draytek Vigor300b Firmware
Draytek Vigor3900 Firmware
Draytek Vigor2960 Firmware
668
VMScore
CVE-2020-10825
A stack-based buffer overflow in /cgi-bin/activate.cgi while base64 decoding ticket parameter on Draytek Vigor3900, Vigor2960, and Vigor300B devices prior to 1.5.1 allows remote malicious users to achieve code execution via a remote HTTP request (issue 3 of 3).
Draytek Vigor300b Firmware
Draytek Vigor3900 Firmware
Draytek Vigor2960 Firmware
891
VMScore
CVE-2020-8515
DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI. This issue has been fixed in Vigor3900/296...
Draytek Vigor2960 Firmware 1.3.1
Draytek Vigor300b Firmware 1.3.3
Draytek Vigor300b Firmware 1.4.2.1
Draytek Vigor300b Firmware 1.4.4
Draytek Vigor3900 Firmware 1.4.4
3 Github repositories
383
VMScore
CVE-2019-16534
On DrayTek Vigor2925 devices with firmware 3.8.4.3, XSS exists via a crafted WAN name on the General Setup screen. NOTE: this is an end-of-life product.
Draytek Vigor2925 Firmware 3.8.4.3
383
VMScore
CVE-2019-16533
On DrayTek Vigor2925 devices with firmware 3.8.4.3, Incorrect Access Control exists in loginset.htm, and can be used to trigger XSS. NOTE: this is an end-of-life product.
Draytek Vigor2925 Firmware 3.8.4.3
383
VMScore
CVE-2018-20872
DrayTek routers prior to 2018-05-23 allow CSRF attacks to change DNS or DHCP settings, a related issue to CVE-2017-11649.
I-lan Draytekl Firmware
605
VMScore
CVE-2017-11649
Cross-site request forgery (CSRF) vulnerability in DrayTek Vigor AP910C devices with firmware 1.2.0_RC3 build r6594 allows remote malicious users to hijack the authentication of unspecified users for requests that enable SNMP on the remote device via vectors involving goform/setS...
Draytek Vigorap 910c Firmware 1.2.0
383
VMScore
CVE-2017-11650
Cross-site scripting (XSS) vulnerability in DrayTek Vigor AP910C devices with firmware 1.2.0_RC3 build r6594 allows remote malicious users to inject arbitrary web script or HTML via vectors involving home.asp.
Draytek Vigorap 910c Firmware 1.2.0
605
VMScore
CVE-2013-5703
The DrayTek Vigor 2700 router 2.8.3 allows remote malicious users to execute arbitrary JavaScript code, and modify settings or the DNS cache, via a crafted SSID value that is not properly handled during insertion into the sWlessSurvey value in variables.js.
Draytek Vigor 2700 Router Firmware 2.8.3
Draytek Vigor 2700 Router -
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4