Vigor165/166 4.2.7 and earlier; Vigor2620/LTE200 3.9.8.9 and earlier; Vigor2860/2925 3.9.8 and earlier; Vigor2862/2926 3.9.9.5 and earlier; Vigor2133/2762/2832 3.9.9 and earlier; Vigor2135/2765/2766 4.4.5. and earlier; Vigor2865/2866/2927 4.4.5.3 and earlier; Vigor2962 4.3.2.8 and earlier; Vigor3912 4.3.6.1 and earlier; Vigor3910 4.4.3.1 and earlier a stack-based buffer overflow vulnerability has been identified in the URL parsing functionality of the TR069 STUN server. This flaw occurs due to insufficient bounds checking on the amount of URL parameters, allowing an attacker to exploit the overflow by sending a maliciously crafted request. Consequently, a remote attacker can execute arbitrary code with elevated privileges.
Metrics
Affected Vendors & Products
References
History
Wed, 28 May 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Draytek
Draytek vigor1000b Draytek vigor1000b Firmware Draytek vigor2133 Draytek vigor2133 Firmware Draytek vigor2135 Draytek vigor2135 Firmware Draytek vigor2620 Draytek vigor2620 Firmware Draytek vigor2762 Draytek vigor2762 Firmware Draytek vigor2763 Draytek vigor2763 Firmware Draytek vigor2765 Draytek vigor2765 Firmware Draytek vigor2766 Draytek vigor2766 Firmware Draytek vigor2832 Draytek vigor2832 Firmware Draytek vigor2860 Draytek vigor2860 Firmware Draytek vigor2862 Draytek vigor2862 Firmware Draytek vigor2865 Draytek vigor2865 Firmware Draytek vigor2866 Draytek vigor2866 Firmware Draytek vigor2915 Draytek vigor2915 Firmware Draytek vigor2925 Draytek vigor2925 Firmware Draytek vigor2926 Draytek vigor2926 Firmware Draytek vigor2927 Draytek vigor2927 Firmware Draytek vigor2952 Draytek vigor2952 Firmware Draytek vigor2962 Draytek vigor2962 Firmware Draytek vigor3220 Draytek vigor3220 Firmware Draytek vigor3910 Draytek vigor3910 Firmware Draytek vigor3912 Draytek vigor3912 Firmware Draytek vigorlte200 Draytek vigorlte200 Firmware |
|
CPEs | cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor2927:-:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor2927_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Draytek
Draytek vigor1000b Draytek vigor1000b Firmware Draytek vigor2133 Draytek vigor2133 Firmware Draytek vigor2135 Draytek vigor2135 Firmware Draytek vigor2620 Draytek vigor2620 Firmware Draytek vigor2762 Draytek vigor2762 Firmware Draytek vigor2763 Draytek vigor2763 Firmware Draytek vigor2765 Draytek vigor2765 Firmware Draytek vigor2766 Draytek vigor2766 Firmware Draytek vigor2832 Draytek vigor2832 Firmware Draytek vigor2860 Draytek vigor2860 Firmware Draytek vigor2862 Draytek vigor2862 Firmware Draytek vigor2865 Draytek vigor2865 Firmware Draytek vigor2866 Draytek vigor2866 Firmware Draytek vigor2915 Draytek vigor2915 Firmware Draytek vigor2925 Draytek vigor2925 Firmware Draytek vigor2926 Draytek vigor2926 Firmware Draytek vigor2927 Draytek vigor2927 Firmware Draytek vigor2952 Draytek vigor2952 Firmware Draytek vigor2962 Draytek vigor2962 Firmware Draytek vigor3220 Draytek vigor3220 Firmware Draytek vigor3910 Draytek vigor3910 Firmware Draytek vigor3912 Draytek vigor3912 Firmware Draytek vigorlte200 Draytek vigorlte200 Firmware |
Tue, 04 Mar 2025 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 28 Feb 2025 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-121 | |
Metrics |
cvssV3_1
|
Thu, 27 Feb 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Vigor165/166 4.2.7 and earlier; Vigor2620/LTE200 3.9.8.9 and earlier; Vigor2860/2925 3.9.8 and earlier; Vigor2862/2926 3.9.9.5 and earlier; Vigor2133/2762/2832 3.9.9 and earlier; Vigor2135/2765/2766 4.4.5. and earlier; Vigor2865/2866/2927 4.4.5.3 and earlier; Vigor2962 4.3.2.8 and earlier; Vigor3912 4.3.6.1 and earlier; Vigor3910 4.4.3.1 and earlier a stack-based buffer overflow vulnerability has been identified in the URL parsing functionality of the TR069 STUN server. This flaw occurs due to insufficient bounds checking on the amount of URL parameters, allowing an attacker to exploit the overflow by sending a maliciously crafted request. Consequently, a remote attacker can execute arbitrary code with elevated privileges. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-02-27T00:00:00.000Z
Updated: 2025-02-28T21:31:37.139Z
Reserved: 2024-10-28T00:00:00.000Z
Link: CVE-2024-51138

Updated: 2025-02-28T21:30:57.828Z

Status : Analyzed
Published: 2025-02-27T21:15:37.023
Modified: 2025-05-28T16:41:26.460
Link: CVE-2024-51138

No data.