Vulnerabilities
Vulnerable Software
Draytek:  >> Vigor3910 Firmware  Security Vulnerabilities
DrayTek Vigor3910 devices through 4.3.2.6 are vulnerable to stored Cross Site Scripting (XSS) by authenticated users due to poor sanitization of the router name.
CVSS Score
4.7
EPSS Score
0.001
Published
2024-10-03
DrayTek Vigor3910 devices through 4.3.2.6 are vulnerable to reflected XSS by authenticated users, caused by missing validation of the sFormAuthStr parameter.
CVSS Score
4.7
EPSS Score
0.001
Published
2024-10-03
DrayTek Vigor3910 devices through 4.3.2.6 are affected by an OS command injection vulnerability that allows an attacker to leverage the recvCmd binary to escape from the emulated instance and inject arbitrary commands into the host machine.
CVSS Score
6.8
EPSS Score
0.023
Published
2024-10-03
A stack-based Buffer Overflow vulnerability in DrayTek Vigor310 devices through 4.3.2.6 allows a remote attacker to execute arbitrary code via a long query string to the cgi-bin/ipfedr.cgi component.
CVSS Score
8.0
EPSS Score
0.002
Published
2024-10-03
Stored XSS, by authenticated users, is caused by poor sanitization of the Login Page Greeting message in DrayTek Vigor310 devices through 4.3.2.6.
CVSS Score
5.4
EPSS Score
0.0
Published
2024-10-03
DrayTek Vigor310 devices through 4.3.2.6 use unencrypted HTTP for authentication requests.
CVSS Score
8.8
EPSS Score
0.001
Published
2024-10-03
DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS.
CVSS Score
6.1
EPSS Score
0.001
Published
2024-10-03
DrayTek Vigor3910 devices through 4.3.2.6 have a stack-based overflow when processing query string parameters because GetCGI mishandles extraneous ampersand characters and long key-value pairs.
CVSS Score
8.0
EPSS Score
0.007
Published
2024-10-03
DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow.
CVSS Score
9.8
EPSS Score
0.018
Published
2024-10-03
An issue in DrayTek Vigor310 devices through 4.3.2.6 allows an attacker to obtain sensitive information because the httpd server of the Vigor management UI uses a static string for seeding the PRNG of OpenSSL.
CVSS Score
7.5
EPSS Score
0.0
Published
2024-10-03


Contact Us

Shodan ® - All rights reserved