CVE-2021-20123

A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the DownloadFileServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.
References
Link Resource
https://www.tenable.com/security/research/tra-2021-42 Exploit Third Party Advisory
https://www.tenable.com/security/research/tra-2021-42 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:draytek:vigorconnect:1.6.0:beta3:*:*:*:*:*:*

History

21 Nov 2024, 05:45

Type Values Removed Values Added
References () https://www.tenable.com/security/research/tra-2021-42 - Exploit, Third Party Advisory () https://www.tenable.com/security/research/tra-2021-42 - Exploit, Third Party Advisory

Information

Published : 2021-10-13 16:15

Updated : 2024-11-21 05:45


NVD link : CVE-2021-20123

Mitre link : CVE-2021-20123

CVE.ORG link : CVE-2021-20123


JSON object : View

Products Affected

draytek

  • vigorconnect
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')