A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.
History

Fri, 16 May 2025 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Draytek
Draytek vigor2960
Draytek vigor2960 Firmware
Draytek vigor300b
Draytek vigor300b Firmware
CPEs cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor300b:-:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2960_firmware:1.5.1.4:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor300b_firmware:1.5.1.4:*:*:*:*:*:*:*
Vendors & Products Draytek
Draytek vigor2960
Draytek vigor2960 Firmware
Draytek vigor300b
Draytek vigor300b Firmware

Thu, 15 May 2025 23:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2025-05-15'}


Thu, 15 May 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 15 May 2025 01:45:00 +0000


Wed, 14 May 2025 17:45:00 +0000


Fri, 27 Dec 2024 21:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Dec 2024 16:15:00 +0000

Type Values Removed Values Added
Description A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.
Title DrayTek Vigor2960/Vigor300B Web Management Interface apmcfgupload os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-12-27T16:00:13.600Z

Updated: 2025-05-17T03:56:01.199Z

Reserved: 2024-12-27T08:03:52.921Z

Link: CVE-2024-12987

cve-icon Vulnrichment

Updated: 2025-05-15T00:13:26.288Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-27T16:15:24.143

Modified: 2025-05-16T18:43:30.507

Link: CVE-2024-12987

cve-icon Redhat

No data.