Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2024-41594

Disclosure Date: October 03, 2024 (last updated October 09, 2024)
An issue in DrayTek Vigor310 devices through 4.3.2.6 allows an attacker to obtain sensitive information because the httpd server of the Vigor management UI uses a static string for seeding the PRNG of OpenSSL.
Attacker Value
Unknown

CVE-2024-41593

Disclosure Date: October 03, 2024 (last updated October 09, 2024)
DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow.
Attacker Value
Unknown

CVE-2024-41591

Disclosure Date: October 03, 2024 (last updated October 09, 2024)
DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS.
Attacker Value
Unknown

CVE-2024-41587

Disclosure Date: October 03, 2024 (last updated October 08, 2024)
Stored XSS, by authenticated users, is caused by poor sanitization of the Login Page Greeting message in DrayTek Vigor310 devices through 4.3.2.6.
Attacker Value
Unknown

CVE-2019-16534

Disclosure Date: September 20, 2019 (last updated November 27, 2024)
On DrayTek Vigor2925 devices with firmware 3.8.4.3, XSS exists via a crafted WAN name on the General Setup screen. NOTE: this is an end-of-life product.
Attacker Value
Unknown

CVE-2019-16533

Disclosure Date: September 20, 2019 (last updated November 27, 2024)
On DrayTek Vigor2925 devices with firmware 3.8.4.3, Incorrect Access Control exists in loginset.htm, and can be used to trigger XSS. NOTE: this is an end-of-life product.