Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-51139

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-27 Feb, 2025 | 00:00
Updated At-28 Feb, 2025 | 17:23
Rejected At-
Credits

Buffer Overflow vulnerability in Vigor2620/LTE200 3.9.8.9 and earlier and Vigor2860/2925 3.9.8 and earlier and Vigor2862/2926 3.9.9.5 and earlier and Vigor2133/2762/2832 3.9.9 and earlier and Vigor165/166 4.2.7 and earlier and Vigor2135/2765/2766 4.4.5.1 and earlier and Vigor2865/2866/2927 4.4.5.3 and earlier and Vigor2962/3910 4.3.2.8/4.4.3.1 and earlier and Vigor3912 4.3.6.1 and earlier allows a remote attacker to execute arbitrary code via the CGI parser's handling of the "Content-Length" header of HTTP POST requests.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:27 Feb, 2025 | 00:00
Updated At:28 Feb, 2025 | 17:23
Rejected At:
▼CVE Numbering Authority (CNA)

Buffer Overflow vulnerability in Vigor2620/LTE200 3.9.8.9 and earlier and Vigor2860/2925 3.9.8 and earlier and Vigor2862/2926 3.9.9.5 and earlier and Vigor2133/2762/2832 3.9.9 and earlier and Vigor165/166 4.2.7 and earlier and Vigor2135/2765/2766 4.4.5.1 and earlier and Vigor2865/2866/2927 4.4.5.3 and earlier and Vigor2962/3910 4.3.2.8/4.4.3.1 and earlier and Vigor3912 4.3.6.1 and earlier allows a remote attacker to execute arbitrary code via the CGI parser's handling of the "Content-Length" header of HTTP POST requests.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://draytek.com
N/A
https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946
N/A
Hyperlink: http://draytek.com
Resource: N/A
Hyperlink: https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-120CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Type: CWE
CWE ID: CWE-120
Description: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Metrics
VersionBase scoreBase severityVector
3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:27 Feb, 2025 | 21:15
Updated At:28 May, 2025 | 16:23

Buffer Overflow vulnerability in Vigor2620/LTE200 3.9.8.9 and earlier and Vigor2860/2925 3.9.8 and earlier and Vigor2862/2926 3.9.9.5 and earlier and Vigor2133/2762/2832 3.9.9 and earlier and Vigor165/166 4.2.7 and earlier and Vigor2135/2765/2766 4.4.5.1 and earlier and Vigor2865/2866/2927 4.4.5.3 and earlier and Vigor2962/3910 4.3.2.8/4.4.3.1 and earlier and Vigor3912 4.3.6.1 and earlier allows a remote attacker to execute arbitrary code via the CGI parser's handling of the "Content-Length" header of HTTP POST requests.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

DrayTek Corp.
draytek
>>vigor2620_firmware>>Versions before 3.9.9.1(exclusive)
cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2620>>-
cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigorlte200_firmware>>Versions before 3.9.9.1(exclusive)
cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigorlte200>>-
cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2860_firmware>>Versions before 3.9.8.3(exclusive)
cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2860>>-
cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2925_firmware>>Versions before 3.9.8.3(exclusive)
cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2925>>-
cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2862_firmware>>Versions before 3.9.9.8(exclusive)
cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2862>>-
cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2926_firmware>>Versions before 3.9.9.8(exclusive)
cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2926>>-
cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2133_firmware>>Versions before 3.9.9.2(exclusive)
cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2133>>-
cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2762_firmware>>Versions before 3.9.9.2(exclusive)
cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2762>>-
cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2832_firmware>>Versions before 3.9.9.2(exclusive)
cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2832>>-
cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2135_firmware>>Versions before 4.4.5.5(exclusive)
cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2135>>-
cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2765_firmware>>Versions before 4.4.5.5(exclusive)
cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2765>>-
cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2766_firmware>>Versions before 4.4.5.5(exclusive)
cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2766>>-
cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2763_firmware>>Versions before 4.4.5.5(exclusive)
cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2763>>-
cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2865_firmware>>Versions before 4.4.5.8(exclusive)
cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2865>>-
cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2866_firmware>>Versions before 4.4.5.8(exclusive)
cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2866>>-
cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2927_firmware>>Versions before 4.4.5.8(exclusive)
cpe:2.3:o:draytek:vigor2927_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2927>>-
cpe:2.3:h:draytek:vigor2927:-:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2962_firmware>>Versions before 4.3.2.9(exclusive)
cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2962_firmware>>Versions from 4.4.3(inclusive) to 4.4.3.2(exclusive)
cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2962>>-
cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor3910_firmware>>Versions before 4.3.2.9(exclusive)
cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor3910_firmware>>Versions from 4.4.3(inclusive) to 4.4.3.2(exclusive)
cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor3910>>-
cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor3912_firmware>>Versions before 4.4.3.2(exclusive)
cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor3912>>-
cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2915_firmware>>Versions before 4.4.5(exclusive)
cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2915>>-
cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor1000b_firmware>>Versions before 4.4.3.2(exclusive)
cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor1000b>>-
cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2952_firmware>>Versions before 3.9.8.5(exclusive)
cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor2952>>-
cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor3220_firmware>>Versions before 3.9.8.5(exclusive)
cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*
DrayTek Corp.
draytek
>>vigor3220>>-
cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-120Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-120
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://draytek.comcve@mitre.org
Product
https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946cve@mitre.org
Third Party Advisory
Hyperlink: http://draytek.com
Source: cve@mitre.org
Resource:
Product
Hyperlink: https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946
Source: cve@mitre.org
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found