NA

CVE-2022-32548

Published: 29/08/2022 Updated: 01/09/2022
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

An issue exists on certain DrayTek Vigor routers before July 2022 such as the Vigor3910 prior to 4.3.1.1. /cgi-bin/wlogin.cgi has a buffer overflow via the username or password to the aa or ab field.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

draytek vigor3910 firmware

draytek vigor1000b firmware

draytek vigor2962 firmware

draytek vigor2962p firmware

draytek vigor2927 firmware

draytek vigor2927ax firmware

draytek vigor2927ac firmware

draytek vigor2927vac firmware

draytek vigor2927l firmware

draytek vigor2927lac firmware

draytek vigor2915 firmware

draytek vigor2915ac firmware

draytek vigor2952 firmware

draytek vigor2952p firmware

draytek vigor3220 firmware

draytek vigor2926 firmware

draytek vigor2926n firmware

draytek vigor2926ac firmware

draytek vigor2926vac firmware

draytek vigor2926l firmware

draytek vigor2926ln firmware

draytek vigor2926lac firmware

draytek vigor2862 firmware

draytek vigor2862n firmware

draytek vigor2862ac firmware

draytek vigor2862vac firmware

draytek vigor2862b firmware

draytek vigor2862bn firmware

draytek vigor2862l firmware

draytek vigor2862ln firmware

draytek vigor2862lac firmware

draytek vigor2620l firmware

draytek vigor2620ln firmware

draytek vigorlte 200n firmware

draytek vigor2133 firmware

draytek vigor2133n firmware

draytek vigor2133ac firmware

draytek vigor2133vac firmware

draytek vigor2133fvac firmware

draytek vigor2762 firmware

draytek vigor2762n firmware

draytek vigor2762ac firmware

draytek vigor2762vac firmware

draytek vigor165 firmware

draytek vigor166 firmware

draytek vigor2135 firmware

draytek vigor2135ac firmware

draytek vigor2135vac firmware

draytek vigor2135fvac firmware

draytek vigor2765 firmware

draytek vigor2765ac firmware

draytek vigor2765vac firmware

draytek vigor2766 firmware

draytek vigor2766ac firmware

draytek vigor2766vac firmware

draytek vigor2832 firmware

draytek vigor2865 firmware

draytek vigor2865ax firmware

draytek vigor2865ac firmware

draytek vigor2865vac firmware

draytek vigor2865l firmware

draytek vigor2865lac firmware

draytek vigor2866 firmware

draytek vigor2866ax firmware

draytek vigor2866ac firmware

draytek vigor2866vac firmware

draytek vigor2866l firmware

draytek vigor2866lac firmware

Github Repositories

CVE-2022-32548-RCE-POC DrayTek unauthenticated remote code execution vulnerability (CVE-2022-32548) in /cgi-bin/wlogincgi via username field Technical details The web management interface of the vulnerable DrayTek devices is affected by a buffer overflow on the login page at /cgi-bin/wlogincgi An attacker may supply carefully crafted username and/or password as base64 encode

OSINT

Autonomous OSINT DESCRIPTION: Under the Saudi Telecom Company JSC network there are around 2300 sytems facing an issue Can you find the category of that vulnerability? To start investigating we first need to find the Autonomous System Number of the Saudi Telecom Company JSC: We can find all ASN numbers in Saudi Arabia in ipinfoio/countries/sa#section-summary Here we