Vulnerabilities
Vulnerable Software
Draytek:  >> Vigor2620 Firmware  Security Vulnerabilities
DrayTek Vigor3910 devices through 4.3.2.6 have a stack-based overflow when processing query string parameters because GetCGI mishandles extraneous ampersand characters and long key-value pairs.
CVSS Score
8.0
EPSS Score
0.008
Published
2024-10-03
DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow.
CVSS Score
9.8
EPSS Score
0.022
Published
2024-10-03
An issue in DrayTek Vigor310 devices through 4.3.2.6 allows an attacker to obtain sensitive information because the httpd server of the Vigor management UI uses a static string for seeding the PRNG of OpenSSL.
CVSS Score
7.5
EPSS Score
0.001
Published
2024-10-03
Buffer Overflow vulnerabilities exist in DrayTek Vigor310 devices through 4.3.2.6 (in the Vigor management UI) because of improper retrieval and handling of the CGI form parameters.
CVSS Score
8.0
EPSS Score
0.001
Published
2024-10-03
user_login.cgi on Draytek Vigor2620 devices before 3.9.8.4 (and on all versions of Vigor2925 devices) allows attackers to send a crafted payload to modify the content of the code segment, insert shellcode, and execute arbitrary code.
CVSS Score
9.8
EPSS Score
0.001
Published
2023-08-21


Contact Us

Shodan ® - All rights reserved