Vulnerability Description
user_login.cgi on Draytek Vigor2620 devices before 3.9.8.4 (and on all versions of Vigor2925 devices) allows attackers to send a crafted payload to modify the content of the code segment, insert shellcode, and execute arbitrary code.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Draytek | Vigor2620 Firmware | < 3.9.8.4 |
| Draytek | Vigor2620 | - |
| Draytek | Vigor2625 Firmware | All versions |
| Draytek | Vigor2625 | - |
Related Weaknesses (CWE)
References
- https://draytek.comProduct
- https://gist.github.com/rrrrrrri/013c9eef64b265af4163478bfcf29ff4Third Party Advisory
- https://draytek.comProduct
- https://gist.github.com/rrrrrrri/013c9eef64b265af4163478bfcf29ff4Third Party Advisory
FAQ
What is CVE-2023-31447?
CVE-2023-31447 is a vulnerability with a CVSS score of 9.8 (CRITICAL). user_login.cgi on Draytek Vigor2620 devices before 3.9.8.4 (and on all versions of Vigor2925 devices) allows attackers to send a crafted payload to modify the content of the code segment, insert shell...
How severe is CVE-2023-31447?
CVE-2023-31447 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-31447?
Check the references section above for vendor advisories and patch information. Affected products include: Draytek Vigor2620 Firmware, Draytek Vigor2620, Draytek Vigor2625 Firmware, Draytek Vigor2625.