CVE-2020-8515

DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI. This issue has been fixed in Vigor3900/2960/300B v1.5.1.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:draytek:vigor2960_firmware:1.3.1:beta:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:draytek:vigor300b_firmware:1.3.3:beta:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor300b_firmware:1.4.2.1:beta:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor300b_firmware:1.4.4:beta:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor300b:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:draytek:vigor3900_firmware:1.4.4:beta:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor3900:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:38

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/156979/DrayTek-Vigor2960-Vigor3900-Vigor300B-Remote-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/156979/DrayTek-Vigor2960-Vigor3900-Vigor300B-Remote-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () https://sku11army.blogspot.com/2020/01/draytek-unauthenticated-rce-in-draytek.html - Permissions Required, Third Party Advisory () https://sku11army.blogspot.com/2020/01/draytek-unauthenticated-rce-in-draytek.html - Permissions Required, Third Party Advisory
References () https://www.draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300b-router-web-management-page-vulnerability-%28cve-2020-8515%29/ - Vendor Advisory () https://www.draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300b-router-web-management-page-vulnerability-%28cve-2020-8515%29/ - Vendor Advisory

25 Jul 2024, 16:40

Type Values Removed Values Added
References () https://sku11army.blogspot.com/2020/01/draytek-unauthenticated-rce-in-draytek.html - Third Party Advisory () https://sku11army.blogspot.com/2020/01/draytek-unauthenticated-rce-in-draytek.html - Permissions Required, Third Party Advisory
References () https://www.draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300b-router-web-management-page-vulnerability-%28cve-2020-8515%29/ - () https://www.draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300b-router-web-management-page-vulnerability-%28cve-2020-8515%29/ - Vendor Advisory

07 Nov 2023, 03:26

Type Values Removed Values Added
References
  • {'url': 'https://www.draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300b-router-web-management-page-vulnerability-(cve-2020-8515)/', 'name': 'https://www.draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300b-router-web-management-page-vulnerability-(cve-2020-8515)/', 'tags': ['Exploit', 'Vendor Advisory'], 'refsource': 'MISC'}
  • () https://www.draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300b-router-web-management-page-vulnerability-%28cve-2020-8515%29/ -

Information

Published : 2020-02-01 13:15

Updated : 2024-11-21 05:38


NVD link : CVE-2020-8515

Mitre link : CVE-2020-8515

CVE.ORG link : CVE-2020-8515


JSON object : View

Products Affected

draytek

  • vigor3900_firmware
  • vigor3900
  • vigor300b_firmware
  • vigor2960
  • vigor2960_firmware
  • vigor300b
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')