Skip to main content

CVE-2020-10827: n/a in n/a

Critical
VulnerabilityCVE-2020-10827cvecve-2020-10827
Published: Thu Mar 26 2020 (03/26/2020, 16:05:12 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

A stack-based buffer overflow in apmd on Draytek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1 allows remote attackers to achieve code execution via a remote HTTP request.

AI-Powered Analysis

AILast updated: 07/03/2025, 09:55:14 UTC

Technical Analysis

CVE-2020-10827 is a critical security vulnerability identified as a stack-based buffer overflow in the apmd service running on Draytek Vigor3900, Vigor2960, and Vigor300B network devices with firmware versions prior to 1.5.1. The vulnerability allows remote attackers to execute arbitrary code on the affected devices by sending a specially crafted HTTP request. This flaw arises due to improper bounds checking in the apmd component, which processes incoming HTTP requests. Exploiting this vulnerability requires no authentication or user interaction, and the attacker can achieve full control over the device, impacting confidentiality, integrity, and availability. The vulnerability has a CVSS v3.1 base score of 9.8, indicating a critical severity level. Although no public exploits have been reported in the wild, the ease of exploitation combined with the high impact makes this a significant threat. The affected Draytek devices are commonly used as enterprise-grade routers and firewalls, often deployed in small to medium-sized business networks and branch offices. Successful exploitation could lead to network compromise, interception or manipulation of traffic, and potential pivoting to internal networks.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for those relying on Draytek Vigor3900, Vigor2960, or Vigor300B devices in their network infrastructure. Compromise of these devices could lead to unauthorized access to sensitive corporate data, disruption of business operations due to device failure or network outages, and potential lateral movement within the corporate network. Given the critical nature of the flaw and the lack of required authentication, attackers could remotely compromise devices over the internet or internal networks. This is particularly concerning for sectors with stringent data protection requirements such as finance, healthcare, and government entities within Europe. Additionally, the disruption of network services could affect compliance with regulations like GDPR, leading to legal and financial repercussions.

Mitigation Recommendations

Organizations should immediately verify if they are using any of the affected Draytek devices and check the firmware version. If running firmware versions prior to 1.5.1, they must upgrade to version 1.5.1 or later where the vulnerability is patched. In the absence of an official patch, network administrators should restrict access to the management interfaces of these devices by implementing strict firewall rules to limit HTTP access to trusted IP addresses only. Disabling unnecessary services such as apmd, if feasible, can reduce the attack surface. Continuous monitoring for unusual network traffic patterns and implementing intrusion detection systems capable of identifying exploit attempts targeting this vulnerability is recommended. Regularly auditing device configurations and applying security best practices for network segmentation will help contain potential compromises. Finally, organizations should maintain an inventory of network devices and ensure timely application of security updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2020-03-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb152

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/3/2025, 9:55:14 AM

Last updated: 7/26/2025, 12:41:43 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats