draytek CVE Vulnerabilities & Metrics

Focus on draytek vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About draytek Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with draytek. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total draytek CVEs: 84
Earliest CVE date: 22 Oct 2013, 22:55 UTC
Latest CVE date: 01 Nov 2024, 18:15 UTC

Latest CVE reference: CVE-2024-51252

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 47

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 840.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 840.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical draytek CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 2.47

Max CVSS: 10.0

Critical CVEs (≥9): 3

CVSS Range vs. Count

Range Count
0.0-3.9 56
4.0-6.9 11
7.0-8.9 15
9.0-10.0 3

CVSS Distribution Chart

Top 5 Highest CVSS draytek CVEs

These are the five CVEs with the highest CVSS scores for draytek, sorted by severity first and recency.

All CVEs for draytek

CVE-2024-51252 draytek vulnerability CVSS: 0 01 Nov 2024, 18:15 UTC

In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the restore function.

CVE-2024-51248 draytek vulnerability CVSS: 0 01 Nov 2024, 17:15 UTC

In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the modifyrow function.

CVE-2024-51247 draytek vulnerability CVSS: 0 01 Nov 2024, 17:15 UTC

In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doPPPo function.

CVE-2024-51245 draytek vulnerability CVSS: 0 01 Nov 2024, 17:15 UTC

In DrayTek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the rename_table function.

CVE-2024-51244 draytek vulnerability CVSS: 0 01 Nov 2024, 17:15 UTC

In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doIPSec function.

CVE-2024-41594 draytek vulnerability CVSS: 0 03 Oct 2024, 19:15 UTC

An issue in DrayTek Vigor310 devices through 4.3.2.6 allows an attacker to obtain sensitive information because the httpd server of the Vigor management UI uses a static string for seeding the PRNG of OpenSSL.

CVE-2024-41593 draytek vulnerability CVSS: 0 03 Oct 2024, 19:15 UTC

DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow.

CVE-2024-41591 draytek vulnerability CVSS: 0 03 Oct 2024, 19:15 UTC

DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS.

CVE-2024-41587 draytek vulnerability CVSS: 0 03 Oct 2024, 19:15 UTC

Stored XSS, by authenticated users, is caused by poor sanitization of the Login Page Greeting message in DrayTek Vigor310 devices through 4.3.2.6.

CVE-2024-46598 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the iprofileidx parameter at dialin.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46597 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sPubKey parameter at dialin.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46596 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sAct parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46595 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the saveitem parameter at lan2lan.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46594 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the saveVPNProfile parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46593 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the trapcomm parameter at cgiswm.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46592 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the ssidencrypt_5g%d parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46591 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sDnsPro parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46590 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the ssidencrypt%d parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46589 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sIpv6AiccuUser parameter at inetipv6.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46588 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sProfileName parameter at wizfw.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46586 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sCloudPass parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46585 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sProfileName parameter at usergrp.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46584 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the AControlIp1 parameter at acontrol.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46583 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the extRadSrv2 parameter at cgiapp.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46582 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sSrvAddr parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46581 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sProfName parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46580 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the fid parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46571 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sPPPSrvNm parameter at fwuser.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46568 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sPeerId parameter at vpn.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46567 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the iProfileIdx parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46566 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sAppName parameter at sslapp.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46565 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sSrvName parameter at service.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46564 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sProfileName parameter at fextobj.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46561 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the queryret parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46560 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the pub_key parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46559 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sBPA_UsrNme parameter at inet15.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46558 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the newProname parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46557 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sProfileName parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46556 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sInRCSecret0 parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46555 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the pb parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46554 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the profname parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46553 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the ipaddrmsk%d parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46552 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sStRtMskShow parameter at ipstrt.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46551 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sBPA_Pwd parameter at inet15.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-46550 draytek vulnerability CVSS: 0 18 Sep 2024, 15:15 UTC

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the CGIbyFieldName parameter at chglog.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

CVE-2024-44845 draytek vulnerability CVSS: 0 06 Sep 2024, 21:15 UTC

DrayTek Vigor3900 v1.5.1.6 was discovered to contain an authenticated command injection vulnerability via the value parameter in the filter_string function.

CVE-2024-44844 draytek vulnerability CVSS: 0 06 Sep 2024, 21:15 UTC

DrayTek Vigor3900 v1.5.1.6 was discovered to contain an authenticated command injection vulnerability via the name parameter in the run_command function.

CVE-2023-47254 draytek vulnerability CVSS: 0 09 Dec 2023, 08:15 UTC

An OS Command Injection in the CLI interface on DrayTek Vigor167 version 5.2.2, allows remote attackers to execute arbitrary system commands and escalate privileges via any account created within the web interface.

CVE-2023-6265 draytek vulnerability CVSS: 0 22 Nov 2023, 20:15 UTC

** UNSUPPORTED WHEN ASSIGNED ** Draytek Vigor2960 v1.5.1.4 and v1.5.1.5 are vulnerable to directory traversal via the mainfunction.cgi dumpSyslog 'option' parameter allowing an authenticated attacker with access to the web management interface to delete arbitrary files. Vigor2960 is no longer supported.

CVE-2023-31447 draytek vulnerability CVSS: 0 21 Aug 2023, 17:15 UTC

user_login.cgi on Draytek Vigor2620 devices before 3.9.8.4 (and on all versions of Vigor2925 devices) allows attackers to send a crafted payload to modify the content of the code segment, insert shellcode, and execute arbitrary code.

CVE-2023-33778 draytek vulnerability CVSS: 0 01 Jun 2023, 04:15 UTC

Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.

CVE-2023-24229 draytek vulnerability CVSS: 0 15 Mar 2023, 18:15 UTC

DrayTek Vigor2960 v1.5.1.4 allows an authenticated attacker with network access to the web management interface to inject operating system commands via the mainfunction.cgi 'parameter' parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

CVE-2023-23313 draytek vulnerability CVSS: 0 03 Mar 2023, 22:15 UTC

Certain Draytek products are vulnerable to Cross Site Scripting (XSS) via the wlogin.cgi script and user_login.cgi script of the router's web application management portal. This affects Vigor3910, Vigor1000B, Vigor2962 v4.3.2.1; Vigor2865 and Vigor2866 v4.4.1.0; Vigor2927 v4.4.2.2; and Vigor2915, Vigor2765, Vigor2766, Vigor2135 v4.4.2.0; Vigor2763 v4.4.2.1; Vigor2862 and Vigor2926 v3.9.9.0; Vigor2925 v3.9.3; Vigor2952 and Vigor3220 v3.9.7.3; Vigor2133 and Vigor2762 v3.9.6.4; and Vigor2832 v3.9.6.2.

CVE-2023-1163 draytek vulnerability CVSS: 4.0 03 Mar 2023, 07:15 UTC

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability has been found in DrayTek Vigor 2960 1.5.1.4/1.5.1.5 and classified as critical. Affected by this vulnerability is the function getSyslogFile of the file mainfunction.cgi of the component Web Management Interface. The manipulation of the argument option leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222259. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

CVE-2023-1162 draytek vulnerability CVSS: 8.3 03 Mar 2023, 07:15 UTC

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in DrayTek Vigor 2960 1.5.1.4/1.5.1.5. Affected is an unknown function of the file mainfunction.cgi of the component Web Management Interface. The manipulation of the argument password leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-222258 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

CVE-2023-1009 draytek vulnerability CVSS: 4.0 24 Feb 2023, 11:15 UTC

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical has been found in DrayTek Vigor 2960 1.5.1.4/1.5.1.5. Affected is the function sub_1DF14 of the file /cgi-bin/mainfunction.cgi of the component Web Management Interface. The manipulation of the argument option with the input /../etc/passwd- leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-221742 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

CVE-2022-32548 draytek vulnerability CVSS: 0 29 Aug 2022, 06:15 UTC

An issue was discovered on certain DrayTek Vigor routers before July 2022 such as the Vigor3910 before 4.3.1.1. /cgi-bin/wlogin.cgi has a buffer overflow via the username or password to the aa or ab field.

CVE-2021-43118 draytek vulnerability CVSS: 7.5 29 Mar 2022, 20:15 UTC

A Remote Command Injection vulnerability exists in DrayTek Vigor 2960 1.5.1.3, DrayTek Vigor 3900 1.5.1.3, and DrayTek Vigor 300B 1.5.1.3 via a crafted HTTP message containing malformed QUERY STRING in mainfunction.cgi, which could let a remote malicious user execute arbitrary code.

CVE-2021-42911 draytek vulnerability CVSS: 7.5 29 Mar 2022, 20:15 UTC

A Format String vulnerability exists in DrayTek Vigor 2960 <= 1.5.1.3, DrayTek Vigor 3900 <= 1.5.1.3, and DrayTek Vigor 300B <= 1.5.1.3 in the mainfunction.cgi file via a crafted HTTP message containing malformed QUERY STRING, which could let a remote malicious user execute arbitrary code.

CVE-2020-28968 draytek vulnerability CVSS: 3.5 22 Oct 2021, 20:15 UTC

Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field.

CVE-2021-20129 draytek vulnerability CVSS: 5.0 13 Oct 2021, 16:15 UTC

An information disclosure vulnerability exists in Draytek VigorConnect 1.6.0-B3, allowing an unauthenticated attacker to export system logs.

CVE-2021-20128 draytek vulnerability CVSS: 3.5 13 Oct 2021, 16:15 UTC

The Profile Name field in the floor plan (Network Menu) page in Draytek VigorConnect 1.6.0-B3 was found to be vulnerable to stored XSS, as user input is not properly sanitized.

CVE-2021-20127 draytek vulnerability CVSS: 8.5 13 Oct 2021, 16:15 UTC

An arbitrary file deletion vulnerability exists in the file delete functionality of the Html5Servlet endpoint of Draytek VigorConnect 1.6.0-B3. This allows an authenticated user to arbitrarily delete files in any location on the target operating system with root privileges.

CVE-2021-20126 draytek vulnerability CVSS: 6.8 13 Oct 2021, 16:15 UTC

Draytek VigorConnect 1.6.0-B3 lacks cross-site request forgery protections and does not sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.

CVE-2021-20125 draytek vulnerability CVSS: 10.0 13 Oct 2021, 16:15 UTC

An arbitrary file upload and directory traversal vulnerability exists in the file upload functionality of DownloadFileServlet in Draytek VigorConnect 1.6.0-B3. An unauthenticated attacker could leverage this vulnerability to upload files to any location on the target operating system with root privileges.

CVE-2021-20124 draytek vulnerability CVSS: 7.8 13 Oct 2021, 16:15 UTC

A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the WebServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.

CVE-2021-20123 draytek vulnerability CVSS: 7.8 13 Oct 2021, 16:15 UTC

A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the DownloadFileServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.

CVE-2020-19664 draytek vulnerability CVSS: 6.5 31 Dec 2020, 02:15 UTC

DrayTek Vigor2960 1.5.1 allows remote command execution via shell metacharacters in a toLogin2FA action to mainfunction.cgi.

CVE-2020-15415 draytek vulnerability CVSS: 7.5 30 Jun 2020, 14:15 UTC

On DrayTek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1, cgi-bin/mainfunction.cgi/cvmcfgupload allows remote command execution via shell metacharacters in a filename when the text/x-python-script content type is used, a different issue than CVE-2020-14472.

CVE-2020-14473 draytek vulnerability CVSS: 7.5 24 Jun 2020, 17:15 UTC

Stack-based buffer overflow vulnerability in Vigor3900, Vigor2960, and Vigor300B with firmware before 1.5.1.1.

CVE-2020-14472 draytek vulnerability CVSS: 7.5 24 Jun 2020, 17:15 UTC

On Draytek Vigor3900, Vigor2960, and Vigor 300B devices before 1.5.1.1, there are some command-injection vulnerabilities in the mainfunction.cgi file.

CVE-2020-14993 draytek vulnerability CVSS: 7.5 23 Jun 2020, 12:15 UTC

A stack-based buffer overflow on DrayTek Vigor2960, Vigor3900, and Vigor300B devices before 1.5.1.1 allows remote attackers to execute arbitrary code via the formuserphonenumber parameter in an authusersms action to mainfunction.cgi.

CVE-2020-3932 draytek vulnerability CVSS: 5.0 15 Apr 2020, 07:15 UTC

A vulnerable SNMP in Draytek VigorAP910C cannot be disabled, which may cause information leakage.

CVE-2020-10828 draytek vulnerability CVSS: 7.5 26 Mar 2020, 17:15 UTC

A stack-based buffer overflow in cvmd on Draytek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1 allows remote attackers to achieve code execution via a remote HTTP request.

CVE-2020-10827 draytek vulnerability CVSS: 7.5 26 Mar 2020, 17:15 UTC

A stack-based buffer overflow in apmd on Draytek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1 allows remote attackers to achieve code execution via a remote HTTP request.

CVE-2020-10826 draytek vulnerability CVSS: 10.0 26 Mar 2020, 17:15 UTC

/cgi-bin/activate.cgi on Draytek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1 allows remote attackers to achieve command injection via a remote HTTP request in DEBUG mode.

CVE-2020-10825 draytek vulnerability CVSS: 7.5 26 Mar 2020, 17:15 UTC

A stack-based buffer overflow in /cgi-bin/activate.cgi while base64 decoding ticket parameter on Draytek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1 allows remote attackers to achieve code execution via a remote HTTP request (issue 3 of 3).

CVE-2020-10824 draytek vulnerability CVSS: 7.5 26 Mar 2020, 17:15 UTC

A stack-based buffer overflow in /cgi-bin/activate.cgi through ticket parameter on Draytek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1 allows remote attackers to achieve code execution via a remote HTTP request (issue 2 of 3).

CVE-2020-10823 draytek vulnerability CVSS: 7.5 26 Mar 2020, 17:15 UTC

A stack-based buffer overflow in /cgi-bin/activate.cgi through var parameter on Draytek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1 allows remote attackers to achieve code execution via a remote HTTP request (issue 1 of 3).

CVE-2020-8515 draytek vulnerability CVSS: 10.0 01 Feb 2020, 13:15 UTC

DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI. This issue has been fixed in Vigor3900/2960/300B v1.5.1.

CVE-2019-16534 draytek vulnerability CVSS: 4.3 20 Sep 2019, 16:15 UTC

On DrayTek Vigor2925 devices with firmware 3.8.4.3, XSS exists via a crafted WAN name on the General Setup screen. NOTE: this is an end-of-life product.

CVE-2019-16533 draytek vulnerability CVSS: 4.3 20 Sep 2019, 16:15 UTC

On DrayTek Vigor2925 devices with firmware 3.8.4.3, Incorrect Access Control exists in loginset.htm, and can be used to trigger XSS. NOTE: this is an end-of-life product.

CVE-2017-11650 draytek vulnerability CVSS: 4.3 07 Mar 2018, 02:29 UTC

Cross-site scripting (XSS) vulnerability in DrayTek Vigor AP910C devices with firmware 1.2.0_RC3 build r6594 allows remote attackers to inject arbitrary web script or HTML via vectors involving home.asp.

CVE-2017-11649 draytek vulnerability CVSS: 6.8 07 Mar 2018, 02:29 UTC

Cross-site request forgery (CSRF) vulnerability in DrayTek Vigor AP910C devices with firmware 1.2.0_RC3 build r6594 allows remote attackers to hijack the authentication of unspecified users for requests that enable SNMP on the remote device via vectors involving goform/setSnmp.

CVE-2013-5703 draytek vulnerability CVSS: 6.8 22 Oct 2013, 22:55 UTC

The DrayTek Vigor 2700 router 2.8.3 allows remote attackers to execute arbitrary JavaScript code, and modify settings or the DNS cache, via a crafted SSID value that is not properly handled during insertion into the sWlessSurvey value in variables.js.