CVE-2024-12987: OS Command Injection in DrayTek Vigor2960
A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2024-12987 is an OS command injection vulnerability identified in the web management interface of DrayTek Vigor2960 and Vigor300B routers running firmware version 1.5.1.4. The vulnerability resides in an unspecified function within the /cgi-bin/mainfunction.cgi/apmcfgupload endpoint, where the 'session' parameter is improperly sanitized, allowing an attacker to inject arbitrary operating system commands. This flaw can be exploited remotely over the network without requiring authentication or user interaction, making it highly accessible to attackers. Successful exploitation could lead to full compromise of the device, enabling attackers to execute arbitrary commands with the privileges of the web management interface process, potentially allowing lateral movement, data exfiltration, or disruption of network services. The vulnerability was publicly disclosed on December 27, 2024, with a CVSS v4.0 base score of 6.9, reflecting medium severity due to the lack of privilege requirements but significant impact on confidentiality, integrity, and availability. No known exploits have been observed in the wild yet. The vendor has released firmware version 1.5.1.5 to address this issue, and upgrading is strongly recommended to mitigate the risk.
Potential Impact
The impact of CVE-2024-12987 is substantial for organizations using affected DrayTek Vigor2960 and Vigor300B devices. Exploitation allows remote attackers to execute arbitrary OS commands without authentication, potentially leading to full device compromise. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, disruption of network services, and use of the compromised device as a pivot point for further attacks. Given that these devices often serve as critical network gateways or VPN concentrators, their compromise could severely affect organizational confidentiality, integrity, and availability. The public disclosure increases the risk of exploitation attempts. Organizations relying on these devices for secure network management are at risk of operational disruption and data breaches if not promptly patched.
Mitigation Recommendations
To mitigate CVE-2024-12987, organizations should immediately upgrade affected DrayTek Vigor2960 and Vigor300B devices to firmware version 1.5.1.5 or later, which contains the fix for this vulnerability. In addition, network administrators should restrict access to the web management interface by implementing network segmentation and firewall rules to limit management access only to trusted IP addresses. Enabling multi-factor authentication and monitoring logs for unusual access patterns can help detect exploitation attempts. If upgrading is temporarily not possible, disabling remote management interfaces or restricting them to internal networks can reduce exposure. Regularly auditing device firmware versions and applying security patches promptly is critical. Finally, organizations should consider deploying intrusion detection systems to monitor for suspicious command injection attempts targeting these devices.
Affected Countries
United States, Germany, United Kingdom, Australia, Japan, South Korea, Taiwan, Singapore, India, Canada
CVE-2024-12987: OS Command Injection in DrayTek Vigor2960
Description
A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-12987 is an OS command injection vulnerability identified in the web management interface of DrayTek Vigor2960 and Vigor300B routers running firmware version 1.5.1.4. The vulnerability resides in an unspecified function within the /cgi-bin/mainfunction.cgi/apmcfgupload endpoint, where the 'session' parameter is improperly sanitized, allowing an attacker to inject arbitrary operating system commands. This flaw can be exploited remotely over the network without requiring authentication or user interaction, making it highly accessible to attackers. Successful exploitation could lead to full compromise of the device, enabling attackers to execute arbitrary commands with the privileges of the web management interface process, potentially allowing lateral movement, data exfiltration, or disruption of network services. The vulnerability was publicly disclosed on December 27, 2024, with a CVSS v4.0 base score of 6.9, reflecting medium severity due to the lack of privilege requirements but significant impact on confidentiality, integrity, and availability. No known exploits have been observed in the wild yet. The vendor has released firmware version 1.5.1.5 to address this issue, and upgrading is strongly recommended to mitigate the risk.
Potential Impact
The impact of CVE-2024-12987 is substantial for organizations using affected DrayTek Vigor2960 and Vigor300B devices. Exploitation allows remote attackers to execute arbitrary OS commands without authentication, potentially leading to full device compromise. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, disruption of network services, and use of the compromised device as a pivot point for further attacks. Given that these devices often serve as critical network gateways or VPN concentrators, their compromise could severely affect organizational confidentiality, integrity, and availability. The public disclosure increases the risk of exploitation attempts. Organizations relying on these devices for secure network management are at risk of operational disruption and data breaches if not promptly patched.
Mitigation Recommendations
To mitigate CVE-2024-12987, organizations should immediately upgrade affected DrayTek Vigor2960 and Vigor300B devices to firmware version 1.5.1.5 or later, which contains the fix for this vulnerability. In addition, network administrators should restrict access to the web management interface by implementing network segmentation and firewall rules to limit management access only to trusted IP addresses. Enabling multi-factor authentication and monitoring logs for unusual access patterns can help detect exploitation attempts. If upgrading is temporarily not possible, disabling remote management interfaces or restricting them to internal networks can reduce exposure. Regularly auditing device firmware versions and applying security patches promptly is critical. Finally, organizations should consider deploying intrusion detection systems to monitor for suspicious command injection attempts targeting these devices.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-12-27T08:03:52.921Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb8ab
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 2/28/2026, 11:51:31 AM
Last updated: 4/12/2026, 6:08:57 PM
Views: 69
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.