Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vigor300b_firmware vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2020-8515
DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI. This issue has been fixed in Vigor3900/296...
Draytek Vigor2960 Firmware 1.3.1
Draytek Vigor300b Firmware 1.3.3
Draytek Vigor300b Firmware 1.4.2.1
Draytek Vigor300b Firmware 1.4.4
Draytek Vigor3900 Firmware 1.4.4
3 Github repositories
9.8
CVSSv3
CVE-2020-15415
On DrayTek Vigor3900, Vigor2960, and Vigor300B devices prior to 1.5.1, cgi-bin/mainfunction.cgi/cvmcfgupload allows remote command execution via shell metacharacters in a filename when the text/x-python-script content type is used, a different issue than CVE-2020-14472.
Draytek Vigor3900 Firmware
Draytek Vigor2960 Firmware
Draytek Vigor300b Firmware
9.8
CVSSv3
CVE-2020-14473
Stack-based buffer overflow vulnerability in Vigor3900, Vigor2960, and Vigor300B with firmware prior to 1.5.1.1.
Draytek Vigor300b Firmware
Draytek Vigor2960 Firmware
Draytek Vigor3900 Firmware
1 Github repository
9.8
CVSSv3
CVE-2020-14993
A stack-based buffer overflow on DrayTek Vigor2960, Vigor3900, and Vigor300B devices prior to 1.5.1.1 allows remote malicious users to execute arbitrary code via the formuserphonenumber parameter in an authusersms action to mainfunction.cgi.
Draytek Vigor300b Firmware
Draytek Vigor2960 Firmware
Draytek Vigor3900 Firmware
9.8
CVSSv3
CVE-2021-42911
A Format String vulnerability exists in DrayTek Vigor 2960 <= 1.5.1.3, DrayTek Vigor 3900 <= 1.5.1.3, and DrayTek Vigor 300B <= 1.5.1.3 in the mainfunction.cgi file via a crafted HTTP message containing malformed QUERY STRING, which could let a remote malicious user exec...
Draytek Vigor2960 Firmware
Draytek Vigor3900 Firmware
Draytek Vigor300b Firmware
9.8
CVSSv3
CVE-2020-10824
A stack-based buffer overflow in /cgi-bin/activate.cgi through ticket parameter on Draytek Vigor3900, Vigor2960, and Vigor300B devices prior to 1.5.1 allows remote malicious users to achieve code execution via a remote HTTP request (issue 2 of 3).
Draytek Vigor300b Firmware
Draytek Vigor3900 Firmware
Draytek Vigor2960 Firmware
9.8
CVSSv3
CVE-2020-10825
A stack-based buffer overflow in /cgi-bin/activate.cgi while base64 decoding ticket parameter on Draytek Vigor3900, Vigor2960, and Vigor300B devices prior to 1.5.1 allows remote malicious users to achieve code execution via a remote HTTP request (issue 3 of 3).
Draytek Vigor300b Firmware
Draytek Vigor3900 Firmware
Draytek Vigor2960 Firmware
9.8
CVSSv3
CVE-2020-10826
/cgi-bin/activate.cgi on Draytek Vigor3900, Vigor2960, and Vigor300B devices prior to 1.5.1 allows remote malicious users to achieve command injection via a remote HTTP request in DEBUG mode.
Draytek Vigor300b Firmware
Draytek Vigor3900 Firmware
Draytek Vigor2960 Firmware
9.8
CVSSv3
CVE-2020-10827
A stack-based buffer overflow in apmd on Draytek Vigor3900, Vigor2960, and Vigor300B devices prior to 1.5.1 allows remote malicious users to achieve code execution via a remote HTTP request.
Draytek Vigor300b Firmware
Draytek Vigor3900 Firmware
Draytek Vigor2960 Firmware
9.8
CVSSv3
CVE-2020-10828
A stack-based buffer overflow in cvmd on Draytek Vigor3900, Vigor2960, and Vigor300B devices prior to 1.5.1 allows remote malicious users to achieve code execution via a remote HTTP request.
Draytek Vigor300b Firmware
Draytek Vigor3900 Firmware
Draytek Vigor2960 Firmware
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »