Filtered by vendor Draytek Subscriptions
Filtered by product Vigor3910 Firmware Subscriptions
Total 52 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-33778 1 Draytek 143 Myvigor, Vigor1000b, Vigor1000b Firmware and 140 more 2025-01-09 9.8 Critical
Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.
CVE-2022-32548 1 Draytek 136 Vigor1000b, Vigor1000b Firmware, Vigor165 and 133 more 2024-11-21 10 Critical
An issue was discovered on certain DrayTek Vigor routers before July 2022 such as the Vigor3910 before 4.3.1.1. /cgi-bin/wlogin.cgi has a buffer overflow via the username or password to the aa or ab field.
CVE-2024-41590 1 Draytek 1 Vigor3910 Firmware 2024-10-07 8 High
Several CGI endpoints are vulnerable to buffer overflows, by authenticated users, because of missing bounds checking on parameters passed through POST requests to the strcpy function on DrayTek Vigor310 devices through 4.3.2.6.
CVE-2024-41588 1 Draytek 1 Vigor3910 Firmware 2024-10-07 8 High
The CGI endpoints v2x00.cgi and cgiwcg.cgi of DrayTek Vigor3910 devices through 4.3.2.6 are vulnerable to buffer overflows, by authenticated users, because of missing bounds checking on parameters passed through POST requests to the strncpy function.
CVE-2024-41585 1 Draytek 1 Vigor3910 Firmware 2024-10-07 6.8 Medium
DrayTek Vigor3910 devices through 4.3.2.6 are affected by an OS command injection vulnerability that allows an attacker to leverage the recvCmd binary to escape from the emulated instance and inject arbitrary commands into the host machine.
CVE-2024-41589 1 Draytek 1 Vigor3910 Firmware 2024-10-04 8.8 High
DrayTek Vigor310 devices through 4.3.2.6 use unencrypted HTTP for authentication requests.
CVE-2024-41592 1 Draytek 1 Vigor3910 Firmware 2024-10-04 8 High
DrayTek Vigor3910 devices through 4.3.2.6 have a stack-based overflow when processing query string parameters because GetCGI mishandles extraneous ampersand characters and long key-value pairs.
CVE-2024-41595 1 Draytek 1 Vigor3910 Firmware 2024-10-04 8 High
DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to change settings or cause a denial of service via .cgi pages because of missing bounds checks on read and write operations.
CVE-2024-41583 1 Draytek 1 Vigor3910 Firmware 2024-10-04 4.7 Medium
DrayTek Vigor3910 devices through 4.3.2.6 are vulnerable to stored Cross Site Scripting (XSS) by authenticated users due to poor sanitization of the router name.
CVE-2024-41596 1 Draytek 1 Vigor3910 Firmware 2024-10-04 8 High
Buffer Overflow vulnerabilities exist in DrayTek Vigor310 devices through 4.3.2.6 (in the Vigor management UI) because of improper retrieval and handling of the CGI form parameters.
CVE-2024-41584 1 Draytek 1 Vigor3910 Firmware 2024-10-04 4.7 Medium
DrayTek Vigor3910 devices through 4.3.2.6 are vulnerable to reflected XSS by authenticated users, caused by missing validation of the sFormAuthStr parameter.
CVE-2024-41586 1 Draytek 1 Vigor3910 Firmware 2024-10-04 8 High
A stack-based Buffer Overflow vulnerability in DrayTek Vigor310 devices through 4.3.2.6 allows a remote attacker to execute arbitrary code via a long query string to the cgi-bin/ipfedr.cgi component.