9.8
CVSSv3

CVE-2020-8515

Published: 01/02/2020 Updated: 07/11/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 891
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI. This issue has been fixed in Vigor3900/2960/300B v1.5.1.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

draytek vigor2960_firmware 1.3.1

draytek vigor300b_firmware 1.3.3

draytek vigor300b_firmware 1.4.2.1

draytek vigor300b_firmware 1.4.4

draytek vigor3900_firmware 1.4.4

Exploits

DrayTek Vigor2960 version 131_Beta, Vigor3900 version 144_Beta, and Vigor300B versions 133_Beta, 1421_Beta, and 144_Beta suffer from a remote command execution vulnerability ...

Github Repositories

Draytek CVE-2020-8515 PoC

CVE-2020-8515 Draytek CVE-2020-8515 PoC I had kicking about Amusingly, the command injected gets executed twice, see here: $ /draytekpy drayteklocal (>) executing command: cat /etc/passwd (+) vulnerable! (>) executing command: uname -a Linux Vigor3900 26335 #1 Wed Mar 28 00:49:28 CST 2018 armv6l unknown Linux Vigor3900 26335 #1 Wed Mar 28 00:49:28 CST 20

CVE-2020-8515-PoC

CVE-2020-8515-PoC CVE-2020-8515-PoC

nmap script to detect CVE-2020-8515 on Draytek Devices

nmap_draytek_rce nmap script to detect CVE-2020-8515 on Draytek Devices