Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51257: n/a

0
High
VulnerabilityCVE-2024-51257cvecve-2024-51257
Published: Wed Oct 30 2024 (10/30/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doCertificate function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 02:52:28 UTC

Technical Analysis

CVE-2024-51257 is a command injection vulnerability identified in the DrayTek Vigor3900 router firmware version 1.5.1.3. The vulnerability resides in the mainfunction.cgi web interface, specifically within the doCertificate function, which improperly sanitizes user input. This flaw allows an attacker with low privileges (PR:L) to inject arbitrary operating system commands remotely over the network (AV:N) without requiring user interaction (UI:N). The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command ('Command Injection')). Successful exploitation results in full compromise of the device, impacting confidentiality, integrity, and availability (C:H/I:H/A:H). The CVSS v3.1 base score is 8.8, reflecting the high severity and ease of exploitation. Although no known exploits are currently reported in the wild, the vulnerability's nature and affected product's role in network infrastructure make it a critical concern. The DrayTek Vigor3900 is widely used in enterprise and ISP environments for routing and VPN services, increasing the potential attack surface globally.

Potential Impact

The exploitation of CVE-2024-51257 can lead to complete compromise of affected DrayTek Vigor3900 routers. Attackers can execute arbitrary commands, potentially gaining persistent control over the device, intercepting or redirecting network traffic, disabling security features, or launching further attacks within the network. This jeopardizes the confidentiality of sensitive data traversing the router, the integrity of network configurations, and the availability of network services. Organizations relying on these routers for critical infrastructure, VPN connectivity, or perimeter defense face significant operational and security risks. The vulnerability's network-exploitable nature means attackers can target devices remotely, increasing the threat scope and potential for widespread disruption.

Mitigation Recommendations

1. Monitor DrayTek official channels for firmware updates addressing CVE-2024-51257 and apply patches immediately upon release. 2. Until patches are available, restrict network access to the router's management interface (mainfunction.cgi) by implementing strict firewall rules, allowing only trusted IP addresses. 3. Disable remote management features if not required, especially web-based interfaces accessible from untrusted networks. 4. Employ network segmentation to isolate critical infrastructure and limit lateral movement in case of compromise. 5. Regularly audit router configurations and logs for suspicious activity indicative of exploitation attempts. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect command injection patterns targeting DrayTek devices. 7. Educate network administrators on the risks and signs of exploitation to enable rapid response.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6baeb7ef31ef0b558b00

Added to database: 2/25/2026, 9:37:50 PM

Last enriched: 2/28/2026, 2:52:28 AM

Last updated: 4/12/2026, 3:40:36 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses