A vulnerability, which was classified as critical, has been found in DrayTek Vigor2960 and Vigor300B 1.5.1.3/1.5.1.4. This issue affects some unknown processing of the file /cgi-bin/mainfunction.cgi/apmcfgupptim of the component Web Management Interface. The manipulation of the argument session leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.
History

Wed, 28 May 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Draytek
Draytek vigor2960
Draytek vigor2960 Firmware
Draytek vigor300b
Draytek vigor300b Firmware
CPEs cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor300b:-:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2960_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor300b_firmware:*:*:*:*:*:*:*:*
Vendors & Products Draytek
Draytek vigor2960
Draytek vigor2960 Firmware
Draytek vigor300b
Draytek vigor300b Firmware

Fri, 16 May 2025 19:45:00 +0000


Mon, 30 Dec 2024 15:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Dec 2024 15:45:00 +0000

Type Values Removed Values Added
Description A vulnerability, which was classified as critical, has been found in DrayTek Vigor2960 and Vigor300B 1.5.1.3/1.5.1.4. This issue affects some unknown processing of the file /cgi-bin/mainfunction.cgi/apmcfgupptim of the component Web Management Interface. The manipulation of the argument session leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.
Title DrayTek Vigor2960/Vigor300B Web Management Interface apmcfgupptim os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-12-27T15:31:05.003Z

Updated: 2025-05-16T18:37:19.459Z

Reserved: 2024-12-27T08:03:50.840Z

Link: CVE-2024-12986

cve-icon Vulnrichment

Updated: 2024-12-30T14:38:00.556Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-27T16:15:23.927

Modified: 2025-05-28T20:21:24.453

Link: CVE-2024-12986

cve-icon Redhat

No data.