#VU97977 Buffer overflow in Hardware solutions


Published: 2024-10-03

Vulnerability identifier: #VU97977

Vulnerability risk: Low

CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-41590

CWE-ID: CWE-119

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Vigor 1000B
Hardware solutions / Routers for home users
Vigor 2962
Hardware solutions / Routers for home users
Vigor 3910
Hardware solutions / Routers for home users
Vigor 3912
Hardware solutions / Routers for home users
Vigor 165
Hardware solutions / Routers for home users
Vigor 166
Hardware solutions / Routers for home users
Vigor 2135
Hardware solutions / Routers for home users
Vigor 2763
Hardware solutions / Routers for home users
Vigor 2765
Hardware solutions / Routers for home users
Vigor 2766
Hardware solutions / Routers for home users
Vigor 2865
Hardware solutions / Routers for home users
Vigor 2866
Hardware solutions / Routers for home users
Vigor 2915
Hardware solutions / Routers for home users
Vigor 2620
Hardware solutions / Routers for home users
Vigor LTE200
Hardware solutions / Routers for home users
Vigor 2133
Hardware solutions / Routers & switches, VoIP, GSM, etc
Vigor 2762
Hardware solutions / Routers & switches, VoIP, GSM, etc
Vigor 2860
Hardware solutions / Routers & switches, VoIP, GSM, etc
Vigor 2925
Hardware solutions / Routers & switches, VoIP, GSM, etc
Vigor 2862
Hardware solutions / Routers & switches, VoIP, GSM, etc
Vigor 2926
Hardware solutions / Routers & switches, VoIP, GSM, etc
Vigor 2952
Hardware solutions / Routers & switches, VoIP, GSM, etc
Vigor 3220
Hardware solutions / Routers & switches, VoIP, GSM, etc
Vigor 2832
Hardware solutions / Security hardware applicances

Vendor:

Description

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the WebUI. A remote privileged user can send a specially crafted HTTP request to the web interface, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions


External links
http://www.forescout.com/resources/draybreak-draytek-research/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability