Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51299: n/a

0
High
VulnerabilityCVE-2024-51299cvecve-2024-51299
Published: Wed Oct 30 2024 (10/30/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the dumpSyslog function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 02:53:47 UTC

Technical Analysis

CVE-2024-51299 is a command injection vulnerability identified in the Draytek Vigor3900 router firmware version 1.5.1.3. The vulnerability exists in the mainfunction.cgi component, specifically through the dumpSyslog function, which improperly sanitizes user input, allowing attackers to inject and execute arbitrary system commands. This flaw is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating that the input is not correctly validated or escaped before being passed to system-level command execution functions. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N), and can be exploited remotely over the network (AV:N). Successful exploitation can lead to full compromise of the device, including unauthorized access to sensitive information, modification or deletion of system files, disruption of network services, and potential pivoting to internal networks. The CVSS v3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation due to low attack complexity and no need for user interaction. Although no public exploits have been reported yet, the vulnerability poses a significant risk to organizations relying on Draytek Vigor3900 routers, especially in critical network environments.

Potential Impact

The impact of CVE-2024-51299 is severe for organizations using the Draytek Vigor3900 router. Exploitation can result in complete system compromise, allowing attackers to execute arbitrary commands with the privileges of the vulnerable service. This can lead to unauthorized data disclosure, modification or destruction of configuration and log files, disruption of network traffic, and potential establishment of persistent backdoors. Given that routers are critical network infrastructure components, compromise can facilitate lateral movement within corporate networks, interception of sensitive communications, and disruption of business operations. The vulnerability's remote exploitability without user interaction increases the risk of automated attacks and wormable scenarios. Organizations in sectors such as telecommunications, finance, government, and critical infrastructure that deploy Draytek devices are particularly at risk. The absence of known public exploits currently provides a window for proactive mitigation, but the high CVSS score indicates that the threat could escalate rapidly once exploitation tools become available.

Mitigation Recommendations

To mitigate CVE-2024-51299, organizations should immediately apply any available firmware updates or patches from Draytek once released. In the absence of patches, restrict access to the router's management interfaces by implementing strict firewall rules limiting access to trusted IP addresses only. Disable remote management features if not required. Employ network segmentation to isolate the router from sensitive internal networks and critical assets. Monitor network traffic and device logs for unusual activities indicative of command injection attempts, such as unexpected system commands or abnormal syslog behavior. Use intrusion detection/prevention systems (IDS/IPS) with signatures targeting command injection patterns. Regularly audit device configurations and access controls to ensure least privilege principles are enforced. Additionally, consider deploying network anomaly detection tools to identify potential exploitation attempts early. Organizations should also prepare incident response plans specific to router compromise scenarios to minimize impact if exploitation occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6baeb7ef31ef0b558b0f

Added to database: 2/25/2026, 9:37:50 PM

Last enriched: 2/28/2026, 2:53:47 AM

Last updated: 4/12/2026, 7:52:27 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses