Vulnerability Description
** UNSUPPORTED WHEN ASSIGNED ** Draytek Vigor2960 v1.5.1.4 and v1.5.1.5 are vulnerable to directory traversal via the mainfunction.cgi dumpSyslog 'option' parameter allowing an authenticated attacker with access to the web management interface to delete arbitrary files. Vigor2960 is no longer supported.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Draytek | Vigor2960 Firmware | 1.5.1.4 |
| Draytek | Vigor2960 | - |
Related Weaknesses (CWE)
References
- https://github.com/xxy1126/Vuln/blob/main/Draytek/4.mdExploit
- https://www.draytek.com/about/newsroom/2021/2021/end-of-life-notification-vigor2Product
- https://www.draytek.com/products/vigor2960/Product
- https://github.com/xxy1126/Vuln/blob/main/Draytek/4.mdExploit
- https://www.draytek.com/about/newsroom/2021/2021/end-of-life-notification-vigor2Product
- https://www.draytek.com/products/vigor2960/Product
FAQ
What is CVE-2023-6265?
CVE-2023-6265 is a vulnerability with a CVSS score of 6.5 (MEDIUM). ** UNSUPPORTED WHEN ASSIGNED ** Draytek Vigor2960 v1.5.1.4 and v1.5.1.5 are vulnerable to directory traversal via the mainfunction.cgi dumpSyslog 'option' parameter allowing an authenticated attacker ...
How severe is CVE-2023-6265?
CVE-2023-6265 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-6265?
Check the references section above for vendor advisories and patch information. Affected products include: Draytek Vigor2960 Firmware, Draytek Vigor2960.