CVE-2024-12987: OS Command Injection in DrayTek Vigor2960
A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2024-12987 is an OS command injection vulnerability identified in DrayTek Vigor2960 and Vigor300B routers running firmware version 1.5.1.4. The vulnerability resides in the web management interface component, specifically within the /cgi-bin/mainfunction.cgi/apmcfgupload endpoint. An attacker can manipulate the 'session' parameter to inject arbitrary operating system commands, which the device executes with the privileges of the web management interface process. This flaw requires no authentication or user interaction, enabling remote attackers to potentially take full control of the affected device. The vulnerability has been assigned a CVSS 4.0 base score of 6.9, reflecting its medium severity due to the ease of remote exploitation but limited scope of impact. The vendor has released firmware version 1.5.1.5 to address this issue. While no active exploitation has been reported, the public disclosure of the vulnerability increases the risk of future attacks, especially targeting network infrastructure devices that are often exposed to the internet or internal networks.
Potential Impact
For European organizations, the exploitation of CVE-2024-12987 could lead to significant security breaches. Successful command injection can allow attackers to execute arbitrary commands, potentially leading to full device compromise, interception or manipulation of network traffic, disruption of network services, and lateral movement within corporate networks. This is particularly critical for organizations relying on DrayTek Vigor2960 or Vigor300B routers as perimeter or internal network gateways. Compromise could result in data exfiltration, espionage, or denial of service. The impact is heightened in sectors such as government, finance, telecommunications, and critical infrastructure, where network integrity and confidentiality are paramount. Additionally, the lack of authentication requirement lowers the barrier for attackers, increasing the likelihood of exploitation if devices remain unpatched.
Mitigation Recommendations
European organizations should immediately verify if they are using DrayTek Vigor2960 or Vigor300B devices running firmware version 1.5.1.4. The primary mitigation is to upgrade all affected devices to firmware version 1.5.1.5 or later, which contains the patch for this vulnerability. Network administrators should restrict access to the web management interface by implementing IP whitelisting or VPN-only access to management interfaces to reduce exposure. Monitoring network traffic for unusual commands or access patterns targeting the /cgi-bin/mainfunction.cgi/apmcfgupload endpoint can help detect exploitation attempts. Additionally, organizations should conduct regular vulnerability assessments and penetration tests focusing on network infrastructure devices. Implementing network segmentation to isolate management interfaces and applying strict firewall rules can further reduce the attack surface.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2024-12987: OS Command Injection in DrayTek Vigor2960
Description
A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2024-12987 is an OS command injection vulnerability identified in DrayTek Vigor2960 and Vigor300B routers running firmware version 1.5.1.4. The vulnerability resides in the web management interface component, specifically within the /cgi-bin/mainfunction.cgi/apmcfgupload endpoint. An attacker can manipulate the 'session' parameter to inject arbitrary operating system commands, which the device executes with the privileges of the web management interface process. This flaw requires no authentication or user interaction, enabling remote attackers to potentially take full control of the affected device. The vulnerability has been assigned a CVSS 4.0 base score of 6.9, reflecting its medium severity due to the ease of remote exploitation but limited scope of impact. The vendor has released firmware version 1.5.1.5 to address this issue. While no active exploitation has been reported, the public disclosure of the vulnerability increases the risk of future attacks, especially targeting network infrastructure devices that are often exposed to the internet or internal networks.
Potential Impact
For European organizations, the exploitation of CVE-2024-12987 could lead to significant security breaches. Successful command injection can allow attackers to execute arbitrary commands, potentially leading to full device compromise, interception or manipulation of network traffic, disruption of network services, and lateral movement within corporate networks. This is particularly critical for organizations relying on DrayTek Vigor2960 or Vigor300B routers as perimeter or internal network gateways. Compromise could result in data exfiltration, espionage, or denial of service. The impact is heightened in sectors such as government, finance, telecommunications, and critical infrastructure, where network integrity and confidentiality are paramount. Additionally, the lack of authentication requirement lowers the barrier for attackers, increasing the likelihood of exploitation if devices remain unpatched.
Mitigation Recommendations
European organizations should immediately verify if they are using DrayTek Vigor2960 or Vigor300B devices running firmware version 1.5.1.4. The primary mitigation is to upgrade all affected devices to firmware version 1.5.1.5 or later, which contains the patch for this vulnerability. Network administrators should restrict access to the web management interface by implementing IP whitelisting or VPN-only access to management interfaces to reduce exposure. Monitoring network traffic for unusual commands or access patterns targeting the /cgi-bin/mainfunction.cgi/apmcfgupload endpoint can help detect exploitation attempts. Additionally, organizations should conduct regular vulnerability assessments and penetration tests focusing on network infrastructure devices. Implementing network segmentation to isolate management interfaces and applying strict firewall rules can further reduce the attack surface.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-12-27T08:03:52.921Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb8ab
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 10/21/2025, 7:53:14 PM
Last updated: 12/1/2025, 5:48:40 PM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.