CVE-2024-12987: OS Command Injection in DrayTek Vigor2960
A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2024-12987 is a security vulnerability identified in the DrayTek Vigor2960 and Vigor300B routers, specifically affecting version 1.5.1.4 of their firmware. The flaw exists within the Web Management Interface component, more precisely in an unknown function related to the /cgi-bin/mainfunction.cgi/apmcfgupload endpoint. The vulnerability arises from improper sanitization of the 'session' argument, which allows an attacker to perform OS command injection remotely without requiring authentication or user interaction. This means an attacker can execute arbitrary operating system commands on the affected device by crafting malicious requests to the vulnerable CGI script. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known exploits in the wild have been reported so far. The CVSS 4.0 base score is 6.9, indicating a medium severity level. The vector string (AV:N/AC:L/AT:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N) highlights that the attack can be launched remotely over the network with low attack complexity, no privileges or user interaction required, and impacts confidentiality, integrity, and availability to a limited extent. The vendor has addressed this vulnerability in firmware version 1.5.1.5, and upgrading to this version or later is recommended to mitigate the risk.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to enterprises, ISPs, and critical infrastructure operators that deploy DrayTek Vigor2960 or Vigor300B routers in their network environments. Successful exploitation could allow attackers to gain unauthorized control over the affected routers, leading to potential interception or manipulation of network traffic, disruption of network services, or use of the compromised device as a foothold for further attacks within the internal network. Given that these routers are often used in small to medium business environments and branch offices, exploitation could result in data breaches, loss of network availability, and compromise of sensitive communications. The ability to execute arbitrary OS commands remotely without authentication increases the threat level, as attackers can automate attacks and potentially pivot to other internal systems. Although no active exploits have been reported, the public disclosure of the vulnerability increases the likelihood of future attacks. Organizations in Europe must consider the impact on confidentiality, integrity, and availability of their network infrastructure and data, especially in sectors such as finance, healthcare, and government where network security is critical.
Mitigation Recommendations
European organizations using DrayTek Vigor2960 or Vigor300B routers should immediately verify their firmware version and upgrade to version 1.5.1.5 or later, which contains the patch for this vulnerability. Network administrators should restrict access to the router’s web management interface by limiting it to trusted IP addresses or internal networks only, and disable remote management if not required. Implement network segmentation to isolate management interfaces from general user traffic. Employ intrusion detection and prevention systems (IDS/IPS) to monitor and block suspicious requests targeting the vulnerable CGI endpoint. Regularly audit router configurations and logs for signs of unauthorized access or command injection attempts. Additionally, organizations should maintain an up-to-date asset inventory to quickly identify affected devices and apply patches promptly. Where possible, consider deploying alternative secure management protocols such as SSH with strong authentication instead of web-based management interfaces. Finally, establish incident response procedures to quickly contain and remediate any compromise resulting from exploitation of this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2024-12987: OS Command Injection in DrayTek Vigor2960
Description
A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2024-12987 is a security vulnerability identified in the DrayTek Vigor2960 and Vigor300B routers, specifically affecting version 1.5.1.4 of their firmware. The flaw exists within the Web Management Interface component, more precisely in an unknown function related to the /cgi-bin/mainfunction.cgi/apmcfgupload endpoint. The vulnerability arises from improper sanitization of the 'session' argument, which allows an attacker to perform OS command injection remotely without requiring authentication or user interaction. This means an attacker can execute arbitrary operating system commands on the affected device by crafting malicious requests to the vulnerable CGI script. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known exploits in the wild have been reported so far. The CVSS 4.0 base score is 6.9, indicating a medium severity level. The vector string (AV:N/AC:L/AT:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N) highlights that the attack can be launched remotely over the network with low attack complexity, no privileges or user interaction required, and impacts confidentiality, integrity, and availability to a limited extent. The vendor has addressed this vulnerability in firmware version 1.5.1.5, and upgrading to this version or later is recommended to mitigate the risk.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to enterprises, ISPs, and critical infrastructure operators that deploy DrayTek Vigor2960 or Vigor300B routers in their network environments. Successful exploitation could allow attackers to gain unauthorized control over the affected routers, leading to potential interception or manipulation of network traffic, disruption of network services, or use of the compromised device as a foothold for further attacks within the internal network. Given that these routers are often used in small to medium business environments and branch offices, exploitation could result in data breaches, loss of network availability, and compromise of sensitive communications. The ability to execute arbitrary OS commands remotely without authentication increases the threat level, as attackers can automate attacks and potentially pivot to other internal systems. Although no active exploits have been reported, the public disclosure of the vulnerability increases the likelihood of future attacks. Organizations in Europe must consider the impact on confidentiality, integrity, and availability of their network infrastructure and data, especially in sectors such as finance, healthcare, and government where network security is critical.
Mitigation Recommendations
European organizations using DrayTek Vigor2960 or Vigor300B routers should immediately verify their firmware version and upgrade to version 1.5.1.5 or later, which contains the patch for this vulnerability. Network administrators should restrict access to the router’s web management interface by limiting it to trusted IP addresses or internal networks only, and disable remote management if not required. Implement network segmentation to isolate management interfaces from general user traffic. Employ intrusion detection and prevention systems (IDS/IPS) to monitor and block suspicious requests targeting the vulnerable CGI endpoint. Regularly audit router configurations and logs for signs of unauthorized access or command injection attempts. Additionally, organizations should maintain an up-to-date asset inventory to quickly identify affected devices and apply patches promptly. Where possible, consider deploying alternative secure management protocols such as SSH with strong authentication instead of web-based management interfaces. Finally, establish incident response procedures to quickly contain and remediate any compromise resulting from exploitation of this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-12-27T08:03:52.921Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb8ab
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/4/2025, 3:12:51 PM
Last updated: 8/12/2025, 3:47:15 PM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.