Vulnerability Description
A stack-based buffer overflow in cvmd on Draytek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1 allows remote attackers to achieve code execution via a remote HTTP request.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Draytek | Vigor300B Firmware | < 1.5.1 |
| Draytek | Vigor300B | - |
| Draytek | Vigor3900 Firmware | < 1.5.1 |
| Draytek | Vigor3900 | - |
| Draytek | Vigor2960 Firmware | < 1.5.1 |
| Draytek | Vigor2960 | - |
Related Weaknesses (CWE)
References
- https://slashd.ga/2020/03/draytek-vulnerabilities/ExploitThird Party Advisory
- https://www.draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300
- https://slashd.ga/2020/03/draytek-vulnerabilities/ExploitThird Party Advisory
- https://www.draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300
FAQ
What is CVE-2020-10828?
CVE-2020-10828 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A stack-based buffer overflow in cvmd on Draytek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1 allows remote attackers to achieve code execution via a remote HTTP request.
How severe is CVE-2020-10828?
CVE-2020-10828 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-10828?
Check the references section above for vendor advisories and patch information. Affected products include: Draytek Vigor300B Firmware, Draytek Vigor300B, Draytek Vigor3900 Firmware, Draytek Vigor3900, Draytek Vigor2960 Firmware.