Vigor165/166 4.2.7 and earlier; Vigor2620/LTE200 3.9.8.9 and earlier; Vigor2860/2925 3.9.8 and earlier; Vigor2862/2926 3.9.9.5 and earlier; Vigor2133/2762/2832 3.9.9 and earlier; Vigor2135/2765/2766 4.4.5. and earlier; Vigor2865/2866/2927 4.4.5.3 and earlier; Vigor2962 4.3.2.8 and earlier; Vigor3912 4.3.6.1 and earlier; Vigor3910 4.4.3.1 and earlier a stack-based buffer overflow vulnerability has been identified in the URL parsing functionality of the TR069 STUN server. This flaw occurs due to insufficient bounds checking on the amount of URL parameters, allowing an attacker to exploit the overflow by sending a maliciously crafted request. Consequently, a remote attacker can execute arbitrary code with elevated privileges.
History

Wed, 28 May 2025 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Draytek
Draytek vigor1000b
Draytek vigor1000b Firmware
Draytek vigor2133
Draytek vigor2133 Firmware
Draytek vigor2135
Draytek vigor2135 Firmware
Draytek vigor2620
Draytek vigor2620 Firmware
Draytek vigor2762
Draytek vigor2762 Firmware
Draytek vigor2763
Draytek vigor2763 Firmware
Draytek vigor2765
Draytek vigor2765 Firmware
Draytek vigor2766
Draytek vigor2766 Firmware
Draytek vigor2832
Draytek vigor2832 Firmware
Draytek vigor2860
Draytek vigor2860 Firmware
Draytek vigor2862
Draytek vigor2862 Firmware
Draytek vigor2865
Draytek vigor2865 Firmware
Draytek vigor2866
Draytek vigor2866 Firmware
Draytek vigor2915
Draytek vigor2915 Firmware
Draytek vigor2925
Draytek vigor2925 Firmware
Draytek vigor2926
Draytek vigor2926 Firmware
Draytek vigor2927
Draytek vigor2927 Firmware
Draytek vigor2952
Draytek vigor2952 Firmware
Draytek vigor2962
Draytek vigor2962 Firmware
Draytek vigor3220
Draytek vigor3220 Firmware
Draytek vigor3910
Draytek vigor3910 Firmware
Draytek vigor3912
Draytek vigor3912 Firmware
Draytek vigorlte200
Draytek vigorlte200 Firmware
CPEs cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2927:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2927_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*
Vendors & Products Draytek
Draytek vigor1000b
Draytek vigor1000b Firmware
Draytek vigor2133
Draytek vigor2133 Firmware
Draytek vigor2135
Draytek vigor2135 Firmware
Draytek vigor2620
Draytek vigor2620 Firmware
Draytek vigor2762
Draytek vigor2762 Firmware
Draytek vigor2763
Draytek vigor2763 Firmware
Draytek vigor2765
Draytek vigor2765 Firmware
Draytek vigor2766
Draytek vigor2766 Firmware
Draytek vigor2832
Draytek vigor2832 Firmware
Draytek vigor2860
Draytek vigor2860 Firmware
Draytek vigor2862
Draytek vigor2862 Firmware
Draytek vigor2865
Draytek vigor2865 Firmware
Draytek vigor2866
Draytek vigor2866 Firmware
Draytek vigor2915
Draytek vigor2915 Firmware
Draytek vigor2925
Draytek vigor2925 Firmware
Draytek vigor2926
Draytek vigor2926 Firmware
Draytek vigor2927
Draytek vigor2927 Firmware
Draytek vigor2952
Draytek vigor2952 Firmware
Draytek vigor2962
Draytek vigor2962 Firmware
Draytek vigor3220
Draytek vigor3220 Firmware
Draytek vigor3910
Draytek vigor3910 Firmware
Draytek vigor3912
Draytek vigor3912 Firmware
Draytek vigorlte200
Draytek vigorlte200 Firmware

Tue, 04 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 28 Feb 2025 22:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-121
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 27 Feb 2025 21:00:00 +0000

Type Values Removed Values Added
Description Vigor165/166 4.2.7 and earlier; Vigor2620/LTE200 3.9.8.9 and earlier; Vigor2860/2925 3.9.8 and earlier; Vigor2862/2926 3.9.9.5 and earlier; Vigor2133/2762/2832 3.9.9 and earlier; Vigor2135/2765/2766 4.4.5. and earlier; Vigor2865/2866/2927 4.4.5.3 and earlier; Vigor2962 4.3.2.8 and earlier; Vigor3912 4.3.6.1 and earlier; Vigor3910 4.4.3.1 and earlier a stack-based buffer overflow vulnerability has been identified in the URL parsing functionality of the TR069 STUN server. This flaw occurs due to insufficient bounds checking on the amount of URL parameters, allowing an attacker to exploit the overflow by sending a maliciously crafted request. Consequently, a remote attacker can execute arbitrary code with elevated privileges.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-02-27T00:00:00.000Z

Updated: 2025-02-28T21:31:37.139Z

Reserved: 2024-10-28T00:00:00.000Z

Link: CVE-2024-51138

cve-icon Vulnrichment

Updated: 2025-02-28T21:30:57.828Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-27T21:15:37.023

Modified: 2025-05-28T16:41:26.460

Link: CVE-2024-51138

cve-icon Redhat

No data.