Skip to main content

CVE-2020-10823: n/a in n/a

Critical
VulnerabilityCVE-2020-10823cvecve-2020-10823
Published: Thu Mar 26 2020 (03/26/2020, 16:04:38 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

A stack-based buffer overflow in /cgi-bin/activate.cgi through var parameter on Draytek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1 allows remote attackers to achieve code execution via a remote HTTP request (issue 1 of 3).

AI-Powered Analysis

AILast updated: 07/03/2025, 09:43:48 UTC

Technical Analysis

CVE-2020-10823 is a critical security vulnerability identified as a stack-based buffer overflow in the /cgi-bin/activate.cgi endpoint of Draytek Vigor routers, specifically the Vigor3900, Vigor2960, and Vigor300B models running firmware versions prior to 1.5.1. The vulnerability arises from improper handling of the 'var' parameter in HTTP requests, allowing a remote attacker to send a specially crafted request that overflows the stack buffer. This overflow can lead to arbitrary code execution on the affected device without requiring any authentication or user interaction. The vulnerability is classified under CWE-787 (Out-of-bounds Write), indicating that the flaw stems from writing data beyond the allocated buffer boundaries, which can corrupt memory and enable control over the execution flow. The CVSS v3.1 base score of 9.8 reflects the critical nature of this vulnerability, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploitation involves sending a remote HTTP request to the vulnerable CGI script, which is typically accessible on the device's management interface. Although no known exploits have been reported in the wild, the severity and ease of exploitation make this a significant threat. The absence of patch links in the provided data suggests that users should verify firmware updates directly from Draytek to remediate this issue. Given the criticality, organizations using these devices should prioritize immediate assessment and mitigation to prevent potential compromise, including remote code execution that could lead to network infiltration, data exfiltration, or disruption of network services.

Potential Impact

For European organizations, the impact of CVE-2020-10823 can be substantial, especially for those relying on Draytek Vigor3900, Vigor2960, or Vigor300B routers in their network infrastructure. Successful exploitation allows attackers to gain full control over the affected routers remotely, potentially bypassing network security controls, intercepting or redirecting traffic, and establishing persistent footholds within corporate networks. This can lead to severe confidentiality breaches, including exposure of sensitive data and credentials, integrity violations through manipulation of network traffic or configurations, and availability disruptions by disabling or destabilizing network connectivity. Given the critical role of routers in enterprise and industrial networks, exploitation could also impact operational technology environments, critical infrastructure, and remote access services. The vulnerability's lack of authentication and user interaction requirements increases the risk of automated exploitation campaigns targeting vulnerable devices exposed to the internet or accessible within internal networks. European organizations in sectors such as finance, healthcare, manufacturing, and government are particularly at risk due to the sensitive nature of their data and the potential for regulatory penalties under GDPR if breaches occur. Additionally, the vulnerability could be leveraged as a stepping stone for broader attacks, including lateral movement and deployment of ransomware or espionage tools.

Mitigation Recommendations

To mitigate CVE-2020-10823 effectively, European organizations should take the following specific actions: 1) Immediately identify and inventory all Draytek Vigor3900, Vigor2960, and Vigor300B devices within their networks. 2) Verify the firmware version on these devices and upgrade to version 1.5.1 or later, as provided by Draytek, which addresses this vulnerability. If official patches are not available, consider temporary mitigations such as disabling remote management interfaces or restricting access to trusted IP addresses only. 3) Implement network segmentation to isolate vulnerable devices from critical network segments and limit exposure to untrusted networks, including the internet. 4) Employ intrusion detection and prevention systems (IDS/IPS) with signatures or anomaly detection rules targeting exploitation attempts against /cgi-bin/activate.cgi or suspicious HTTP requests to these devices. 5) Monitor network traffic and device logs for unusual activity indicative of exploitation attempts or successful compromise. 6) Enforce strict access controls and multi-factor authentication for management interfaces to reduce the risk of unauthorized access. 7) Educate IT and security teams about this vulnerability and ensure incident response plans include procedures for compromised network devices. 8) Engage with Draytek support channels for timely updates and advisories. These targeted measures go beyond generic advice by focusing on device-specific firmware management, network architecture adjustments, and proactive monitoring tailored to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2020-03-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb105

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/3/2025, 9:43:48 AM

Last updated: 8/10/2025, 4:07:02 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats