CVE-2024-41593

Oct. 8, 2024, 3:35 p.m.

9.8
Critical

Description

DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow.

Product(s) Impacted

Vendor Product Versions
Draytek
  • Vigor3912 Firmware
  • Vigor3912
  • Vigor2962 Firmware
  • Vigor2962
  • Vigor3910 Firmware
  • Vigor3910
  • Vigor165 Firmware
  • Vigor165
  • Vigor1000b Firmware
  • Vigor1000b
  • Vigor166 Firmware
  • Vigor166
  • Vigor2135 Firmware
  • Vigor2135
  • Vigor2763 Firmware
  • Vigor2763
  • Vigor2765 Firmware
  • Vigor2765
  • Vigor2865 Firmware
  • Vigor2865
  • Vigor2766 Firmware
  • Vigor2766
  • Vigor2866 Firmware
  • Vigor2866
  • Vigor2915 Firmware
  • Vigor2915
  • Vigor2620 Firmware
  • Vigor2620
  • Vigorlte200 Firmware
  • Vigorlte200
  • Vigor2133 Firmware
  • Vigor2133
  • Vigor2762 Firmware
  • Vigor2762
  • Vigor2832 Firmware
  • Vigor2832
  • Vigor2860 Firmware
  • Vigor2860
  • Vigor2862 Firmware
  • Vigor2862
  • Vigor2925 Firmware
  • Vigor2925
  • Vigor2926 Firmware
  • Vigor2926
  • Vigor2952 Firmware
  • Vigor2952
  • Vigor3220 Firmware
  • Vigor3220
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-787
Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
o draytek vigor3912_firmware / / / / / / / /
h draytek vigor3912 - / / / / / / /
o draytek vigor2962_firmware / / / / / / / /
o draytek vigor2962_firmware / / / / / / / /
h draytek vigor2962 - / / / / / / /
o draytek vigor3910_firmware / / / / / / / /
o draytek vigor3910_firmware / / / / / / / /
h draytek vigor3910 - / / / / / / /
o draytek vigor165_firmware / / / / / / / /
h draytek vigor165 - / / / / / / /
o draytek vigor1000b_firmware / / / / / / / /
o draytek vigor1000b_firmware / / / / / / / /
h draytek vigor1000b - / / / / / / /
o draytek vigor166_firmware / / / / / / / /
h draytek vigor166 - / / / / / / /
o draytek vigor2135_firmware / / / / / / / /
h draytek vigor2135 - / / / / / / /
o draytek vigor2763_firmware / / / / / / / /
h draytek vigor2763 - / / / / / / /
o draytek vigor2765_firmware / / / / / / / /
h draytek vigor2765 - / / / / / / /
o draytek vigor2865_firmware / / / / / / / /
h draytek vigor2865 - / / / / / / /
o draytek vigor2766_firmware / / / / / / / /
h draytek vigor2766 - / / / / / / /
o draytek vigor2866_firmware / / / / / / / /
h draytek vigor2866 - / / / / / / /
o draytek vigor2915_firmware / / / / / / / /
h draytek vigor2915 - / / / / / / /
o draytek vigor2620_firmware / / / / / / / /
h draytek vigor2620 - / / / / / / /
o draytek vigorlte200_firmware / / / / / / / /
h draytek vigorlte200 - / / / / / / /
o draytek vigor2133_firmware / / / / / / / /
h draytek vigor2133 - / / / / / / /
o draytek vigor2762_firmware / / / / / / / /
h draytek vigor2762 - / / / / / / /
o draytek vigor2832_firmware / / / / / / / /
h draytek vigor2832 - / / / / / / /
o draytek vigor2860_firmware / / / / / / / /
h draytek vigor2860 - / / / / / / /
o draytek vigor2862_firmware / / / / / / / /
h draytek vigor2862 - / / / / / / /
o draytek vigor2925_firmware / / / / / / / /
h draytek vigor2925 - / / / / / / /
o draytek vigor2926_firmware / / / / / / / /
h draytek vigor2926 - / / / / / / /
o draytek vigor2952_firmware / / / / / / / /
h draytek vigor2952 - / / / / / / /
o draytek vigor3220_firmware / / / / / / / /
h draytek vigor3220 - / / / / / / /

CVSS Score

9.8 / 10

CVSS Data - 3.1

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

    View Vector String

Timeline

Published: Oct. 3, 2024, 7:15 p.m.
Last Modified: Oct. 8, 2024, 3:35 p.m.

Status : Analyzed

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

cve@mitre.org

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.