Vulnerability Description
A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the DownloadFileServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Draytek | Vigorconnect | 1.6.0 |
Related Weaknesses (CWE)
References
- https://www.tenable.com/security/research/tra-2021-42ExploitThird Party Advisory
- https://www.tenable.com/security/research/tra-2021-42ExploitThird Party Advisory
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-US Government Resource
FAQ
What is CVE-2021-20123?
CVE-2021-20123 is a vulnerability with a CVSS score of 7.5 (HIGH). A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the DownloadFileServlet endpoint. An unauthenticated attacker could leverage this vul...
How severe is CVE-2021-20123?
CVE-2021-20123 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-20123?
Check the references section above for vendor advisories and patch information. Affected products include: Draytek Vigorconnect.