Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46316: n/a

0
High
VulnerabilityCVE-2024-46316cvecve-2024-46316
Published: Wed Oct 09 2024 (10/09/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

DrayTek Vigor3900 v1.5.1.6 was discovered to contain a command injection vulnerability via the sub_2C920 function at /cgi-bin/mainfunction.cgi. This vulnerability allows attackers to execute arbitrary commands via supplying a crafted HTTP message.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:32:53 UTC

Technical Analysis

CVE-2024-46316 is a command injection vulnerability identified in the DrayTek Vigor3900 router firmware version 1.5.1.6. The vulnerability resides in the sub_2C920 function, which is accessible via the /cgi-bin/mainfunction.cgi endpoint. An attacker can exploit this flaw by sending a specially crafted HTTP message that injects arbitrary commands into the system shell. The vulnerability requires low privileges (PR:L) and can be exploited remotely over the network (AV:A) without any user interaction (UI:N). The attack complexity is low (AC:L), meaning exploitation does not require sophisticated conditions. Successful exploitation can lead to full compromise of the device, allowing attackers to execute arbitrary commands with the privileges of the web server process, potentially leading to full system compromise. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), indicating a failure to properly sanitize user-supplied input before passing it to system commands. Although no public exploits have been reported yet, the vulnerability's characteristics suggest it could be weaponized quickly. The affected device, DrayTek Vigor3900, is a widely used enterprise-grade router, often deployed in small to medium business environments and branch offices, making the impact potentially broad. The lack of an official patch at the time of disclosure increases the urgency for interim mitigations.

Potential Impact

The impact of CVE-2024-46316 is severe for organizations using DrayTek Vigor3900 routers. Exploitation can lead to complete compromise of the device, enabling attackers to execute arbitrary commands, which can disrupt network operations, exfiltrate sensitive data, or pivot to internal networks. This threatens confidentiality, integrity, and availability of network infrastructure. Compromised routers can be used as footholds for further attacks, including lateral movement, data interception, or launching attacks against other networked systems. Given the router’s role in managing network traffic and security policies, attackers could disable security controls, redirect traffic, or create persistent backdoors. Organizations relying on these devices without timely patching or mitigation face increased risk of network breaches, data loss, and operational downtime. The vulnerability's remote exploitability and lack of required user interaction increase the likelihood of automated exploitation attempts once public exploit code becomes available.

Mitigation Recommendations

Until an official patch is released, organizations should implement several specific mitigations: 1) Restrict access to the router’s management interfaces (especially /cgi-bin/mainfunction.cgi) to trusted IP addresses only, preferably via firewall rules or VPNs. 2) Disable remote management features if not required, or restrict them to secure channels with strong authentication. 3) Monitor network traffic for unusual HTTP requests targeting the vulnerable CGI endpoint, using IDS/IPS signatures or custom detection rules. 4) Employ network segmentation to isolate critical infrastructure and limit the router’s exposure to untrusted networks. 5) Regularly audit router configurations and logs for signs of compromise or unauthorized command execution. 6) Engage with DrayTek support or vendor channels to obtain patches or firmware updates as soon as they become available and apply them promptly. 7) Consider deploying additional endpoint and network security controls to detect and prevent post-exploitation activities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cfcb7ef31ef0b56ab2f

Added to database: 2/25/2026, 9:43:24 PM

Last enriched: 2/26/2026, 8:32:53 AM

Last updated: 4/12/2026, 3:46:41 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses