Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2024-41594
Disclosure Date: October 03, 2024 (last updated October 09, 2024)
An issue in DrayTek Vigor310 devices through 4.3.2.6 allows an attacker to obtain sensitive information because the httpd server of the Vigor management UI uses a static string for seeding the PRNG of OpenSSL.
0
Attacker Value
Unknown
CVE-2024-41593
Disclosure Date: October 03, 2024 (last updated October 09, 2024)
DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow.
0
Attacker Value
Unknown
CVE-2024-41591
Disclosure Date: October 03, 2024 (last updated October 09, 2024)
DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS.
0
Attacker Value
Unknown
CVE-2024-41587
Disclosure Date: October 03, 2024 (last updated October 08, 2024)
Stored XSS, by authenticated users, is caused by poor sanitization of the Login Page Greeting message in DrayTek Vigor310 devices through 4.3.2.6.
0
Attacker Value
Unknown
CVE-2023-33778
Disclosure Date: June 01, 2023 (last updated October 08, 2023)
Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.
0
Attacker Value
Unknown
CVE-2022-32548
Disclosure Date: August 29, 2022 (last updated October 08, 2023)
An issue was discovered on certain DrayTek Vigor routers before July 2022 such as the Vigor3910 before 4.3.1.1. /cgi-bin/wlogin.cgi has a buffer overflow via the username or password to the aa or ab field.
0