Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12987: OS Command Injection in DrayTek Vigor2960

0
Medium
VulnerabilityCVE-2024-12987cvecve-2024-12987
Published: Fri Dec 27 2024 (12/27/2024, 16:00:13 UTC)
Source: CVE
Vendor/Project: DrayTek
Product: Vigor2960

Description

A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.

AI-Powered Analysis

AILast updated: 10/21/2025, 19:53:14 UTC

Technical Analysis

CVE-2024-12987 is an OS command injection vulnerability identified in DrayTek Vigor2960 and Vigor300B routers running firmware version 1.5.1.4. The vulnerability resides in the web management interface component, specifically within the /cgi-bin/mainfunction.cgi/apmcfgupload endpoint. An attacker can manipulate the 'session' parameter to inject arbitrary operating system commands, which the device executes with the privileges of the web management interface process. This flaw requires no authentication or user interaction, enabling remote attackers to potentially take full control of the affected device. The vulnerability has been assigned a CVSS 4.0 base score of 6.9, reflecting its medium severity due to the ease of remote exploitation but limited scope of impact. The vendor has released firmware version 1.5.1.5 to address this issue. While no active exploitation has been reported, the public disclosure of the vulnerability increases the risk of future attacks, especially targeting network infrastructure devices that are often exposed to the internet or internal networks.

Potential Impact

For European organizations, the exploitation of CVE-2024-12987 could lead to significant security breaches. Successful command injection can allow attackers to execute arbitrary commands, potentially leading to full device compromise, interception or manipulation of network traffic, disruption of network services, and lateral movement within corporate networks. This is particularly critical for organizations relying on DrayTek Vigor2960 or Vigor300B routers as perimeter or internal network gateways. Compromise could result in data exfiltration, espionage, or denial of service. The impact is heightened in sectors such as government, finance, telecommunications, and critical infrastructure, where network integrity and confidentiality are paramount. Additionally, the lack of authentication requirement lowers the barrier for attackers, increasing the likelihood of exploitation if devices remain unpatched.

Mitigation Recommendations

European organizations should immediately verify if they are using DrayTek Vigor2960 or Vigor300B devices running firmware version 1.5.1.4. The primary mitigation is to upgrade all affected devices to firmware version 1.5.1.5 or later, which contains the patch for this vulnerability. Network administrators should restrict access to the web management interface by implementing IP whitelisting or VPN-only access to management interfaces to reduce exposure. Monitoring network traffic for unusual commands or access patterns targeting the /cgi-bin/mainfunction.cgi/apmcfgupload endpoint can help detect exploitation attempts. Additionally, organizations should conduct regular vulnerability assessments and penetration tests focusing on network infrastructure devices. Implementing network segmentation to isolate management interfaces and applying strict firewall rules can further reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-12-27T08:03:52.921Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb8ab

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 10/21/2025, 7:53:14 PM

Last updated: 12/1/2025, 5:48:40 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats