Incorrect Control over DrayTek Vigor Router

condignly Overview :
On DrayTek Vigor2925 devices with firmware 3.8.4.3, Incorrect Access Control exists in loginset.htm, and can be used to trigger XSS. NOTE: this is an end-of-life product.

On DrayTek Vigor2925 devices with firmware 3.8.4.3, XSS exists via a crafted WAN name on the General Setup screen. NOTE: this is an end-of-life product.

http://schottremovals.co.uk/david-l-1662017/ Affected Product(s) :
  • DrayTek Vigor2925 devices with firmware 3.8.4.3
Vulnerability Details :
CVE ID : CVE-2019-16533
Incorrect Access Control exists in loginset.htm
CVE ID : CVE-2019-16534
XSS exists via a crafted WAN name on the General Setup screen

Solution : update to the latest version

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2024-20381 : CISCO IOS XR JSON-RPC API IMPROPER AUTHORIZATION

CVE-2024-20381 : CISCO IOS XR JSON-RPC API IMPROPER AUTHORIZATION

Description A vulnerability in the JSON-RPC API feature in ConfD that is used by the web-based management interfaces of Cisco

CVE-2024-44466 : COMFAST CF-XR11 2.7.2 HTTP POST REQUEST /USR/BIN/WEBMGNT SUB_424CB4 IFACE COMMAND INJECTION

CVE-2024-44466 : COMFAST CF-XR11 2.7.2 HTTP POST REQUEST /USR/BIN/WEBMGNT SUB_424CB4 IFACE COMMAND INJECTION

Description COMFAST CF-XR11 V2.7.2 has a command injection vulnerability in function sub_424CB4. Attackers can send POST request messages to /usr/bin/webmgnt

CVE-2024-45013 : LINUX KERNEL UP TO 6.10.6 NVME_UNINIT_CTRL USE AFTER FREE

CVE-2024-45013 : LINUX KERNEL UP TO 6.10.6 NVME_UNINIT_CTRL USE AFTER FREE

Description In the Linux kernel, the following vulnerability has been resolved: nvme: move stopping keep-alive into nvme_uninit_ctrl() Commit 4733b65d82bd (“nvme: