ID

VAR-202303-0563


CVE

CVE-2023-23313


TITLE

plural  DrayTek Corporation  Cross-site scripting vulnerability in the product

Trust: 0.8

sources: JVNDB: JVNDB-2023-004845

DESCRIPTION

Certain Draytek products are vulnerable to Cross Site Scripting (XSS) via the wlogin.cgi script and user_login.cgi script of the router's web application management portal. This affects Vigor3910, Vigor1000B, Vigor2962 v4.3.2.1; Vigor2865 and Vigor2866 v4.4.1.0; Vigor2927 v4.4.2.2; and Vigor2915, Vigor2765, Vigor2766, Vigor2135 v4.4.2.0; Vigor2763 v4.4.2.1; Vigor2862 and Vigor2926 v3.9.9.0; Vigor2925 v3.9.3; Vigor2952 and Vigor3220 v3.9.7.3; Vigor2133 and Vigor2762 v3.9.6.4; and Vigor2832 v3.9.6.2. vigor2860 firmware, vigor2860n firmware, vigor2860n-plus firmware etc. DrayTek Corporation A cross-site scripting vulnerability exists in the product.Information may be obtained and information may be tampered with

Trust: 1.71

sources: NVD: CVE-2023-23313 // JVNDB: JVNDB-2023-004845 // VULMON: CVE-2023-23313

AFFECTED PRODUCTS

vendor:draytekmodel:vigor2927lacscope:ltversion:4.4.2.3

Trust: 1.0

vendor:draytekmodel:vigor166scope:ltversion:4.2.4.1

Trust: 1.0

vendor:draytekmodel:vigor2860lscope:ltversion:3.9.4

Trust: 1.0

vendor:draytekmodel:vigor2926lnscope:ltversion:3.9.9.1

Trust: 1.0

vendor:draytekmodel:vigor2763scope:ltversion:4.4.2.2

Trust: 1.0

vendor:draytekmodel:vigor2926scope:ltversion:3.9.9.1

Trust: 1.0

vendor:draytekmodel:vigor2862scope:ltversion:3.9.9.1

Trust: 1.0

vendor:draytekmodel:vigor2133nscope:ltversion:3.9.6.5

Trust: 1.0

vendor:draytekmodel:vigor2865lacscope:ltversion:4.4.1.1

Trust: 1.0

vendor:draytekmodel:vigor2860lnscope:ltversion:3.9.4

Trust: 1.0

vendor:draytekmodel:vigor2135vacscope:ltversion:4.4.2.1

Trust: 1.0

vendor:draytekmodel:vigor2762scope:ltversion:3.9.6.5

Trust: 1.0

vendor:draytekmodel:vigor2860vn-plusscope:ltversion:3.9.4

Trust: 1.0

vendor:draytekmodel:vigor2135axscope:ltversion:4.4.2.1

Trust: 1.0

vendor:draytekmodel:vigor3220scope:ltversion:3.9.7.4

Trust: 1.0

vendor:draytekmodel:vigor2832scope:ltversion:3.9.6.3

Trust: 1.0

vendor:draytekmodel:vigor2925lnscope:ltversion:3.9.4

Trust: 1.0

vendor:draytekmodel:vigor2765acscope:ltversion:4.4.2.1

Trust: 1.0

vendor:draytekmodel:vigor3910scope:ltversion:4.3.2.2

Trust: 1.0

vendor:draytekmodel:vigor2766acscope:ltversion:4.4.2.1

Trust: 1.0

vendor:draytekmodel:vigor2862lnscope:ltversion:3.9.9.1

Trust: 1.0

vendor:draytekmodel:vigor2925nscope:ltversion:3.9.4

Trust: 1.0

vendor:draytekmodel:vigor2926acscope:ltversion:3.9.9.1

Trust: 1.0

vendor:draytekmodel:vigor2915acscope:ltversion:4.4.2.1

Trust: 1.0

vendor:draytekmodel:vigor2763acscope:ltversion:4.4.2.2

Trust: 1.0

vendor:draytekmodel:vigor2865vacscope:ltversion:4.4.1.1

Trust: 1.0

vendor:draytekmodel:vigor2862bnscope:ltversion:3.9.9.1

Trust: 1.0

vendor:draytekmodel:vigor2925lscope:ltversion:3.9.4

Trust: 1.0

vendor:draytekmodel:vigor2133acscope:ltversion:3.9.6.5

Trust: 1.0

vendor:draytekmodel:vigor2766vacscope:ltversion:4.4.2.1

Trust: 1.0

vendor:draytekmodel:vigor2915scope:ltversion:4.4.2.1

Trust: 1.0

vendor:draytekmodel:vigor2133fvacscope:ltversion:3.9.6.5

Trust: 1.0

vendor:draytekmodel:vigor2860nscope:ltversion:3.9.4

Trust: 1.0

vendor:draytekmodel:vigor2762vacscope:ltversion:3.9.6.5

Trust: 1.0

vendor:draytekmodel:vigor2866lacscope:ltversion:4.4.1.1

Trust: 1.0

vendor:draytekmodel:vigor2865lscope:ltversion:4.4.1.1

Trust: 1.0

vendor:draytekmodel:vigor2865acscope:ltversion:4.4.1.1

Trust: 1.0

vendor:draytekmodel:vigor2925vacscope:ltversion:3.9.4

Trust: 1.0

vendor:draytekmodel:vigor2925vn-plusscope:ltversion:3.9.4

Trust: 1.0

vendor:draytekmodel:vigor2862bscope:ltversion:3.9.9.1

Trust: 1.0

vendor:draytekmodel:vigor2926nscope:ltversion:3.9.9.1

Trust: 1.0

vendor:draytekmodel:vigor2135acscope:ltversion:4.4.2.1

Trust: 1.0

vendor:draytekmodel:vigor1000bscope:ltversion:4.3.2.2

Trust: 1.0

vendor:draytekmodel:vigor2926lscope:ltversion:3.9.9.1

Trust: 1.0

vendor:draytekmodel:vigor2762nscope:ltversion:3.9.6.5

Trust: 1.0

vendor:draytekmodel:vigor2926vacscope:ltversion:3.9.9.1

Trust: 1.0

vendor:draytekmodel:vigor2866acscope:ltversion:4.4.1.1

Trust: 1.0

vendor:draytekmodel:vigor130scope:ltversion:3.8.5.1

Trust: 1.0

vendor:draytekmodel:vigor2765scope:ltversion:4.4.2.1

Trust: 1.0

vendor:draytekmodel:vigor2925fnscope:ltversion:3.9.4

Trust: 1.0

vendor:draytekmodel:vigor2135fvacscope:ltversion:4.4.2.1

Trust: 1.0

vendor:draytekmodel:vigor2133vacscope:ltversion:3.9.6.5

Trust: 1.0

vendor:draytekmodel:vigor2860acscope:ltversion:3.9.4

Trust: 1.0

vendor:draytekmodel:vigor2765vascope:ltversion:4.4.2.1

Trust: 1.0

vendor:draytekmodel:vigor2866scope:ltversion:4.4.1.1

Trust: 1.0

vendor:draytekmodel:vigor2860n-plusscope:ltversion:3.9.4

Trust: 1.0

vendor:draytekmodel:vigor2766axscope:ltversion:4.4.2.1

Trust: 1.0

vendor:draytekmodel:vigor165scope:ltversion:4.2.4.1

Trust: 1.0

vendor:draytekmodel:vigor2865axscope:ltversion:4.4.1.1

Trust: 1.0

vendor:draytekmodel:vigor2962scope:ltversion:4.3.2.2

Trust: 1.0

vendor:draytekmodel:vigor2952scope:ltversion:3.9.7.4

Trust: 1.0

vendor:draytekmodel:vigor2866vacscope:ltversion:4.4.1.1

Trust: 1.0

vendor:draytekmodel:vigor2927vacscope:ltversion:4.4.2.3

Trust: 1.0

vendor:draytekmodel:vigor2866lscope:ltversion:4.4.1.1

Trust: 1.0

vendor:draytekmodel:vigor2135scope:ltversion:4.4.2.1

Trust: 1.0

vendor:draytekmodel:vigor2925scope:ltversion:3.9.4

Trust: 1.0

vendor:draytekmodel:vigor2926lacscope:ltversion:3.9.9.1

Trust: 1.0

vendor:draytekmodel:vigor2766scope:ltversion:4.4.2.1

Trust: 1.0

vendor:draytekmodel:vigor2952pscope:ltversion:3.9.7.4

Trust: 1.0

vendor:draytekmodel:vigor2865scope:ltversion:4.4.1.1

Trust: 1.0

vendor:draytekmodel:vigor2762acscope:ltversion:3.9.6.5

Trust: 1.0

vendor:draytekmodel:vigor2765axscope:ltversion:4.4.2.1

Trust: 1.0

vendor:draytekmodel:vigornic 132scope:ltversion:3.8.5.1

Trust: 1.0

vendor:draytekmodel:vigor2862acscope:ltversion:3.9.9.1

Trust: 1.0

vendor:draytekmodel:vigor2866axscope:ltversion:4.4.1.1

Trust: 1.0

vendor:draytekmodel:vigor2927axscope:ltversion:4.4.2.3

Trust: 1.0

vendor:draytekmodel:vigor2860scope:ltversion:3.9.4

Trust: 1.0

vendor:draytekmodel:vigor2860vacscope:ltversion:3.9.4

Trust: 1.0

vendor:draytekmodel:vigor2927acscope:ltversion:4.4.2.3

Trust: 1.0

vendor:draytekmodel:vigor2862nscope:ltversion:3.9.9.1

Trust: 1.0

vendor:draytekmodel:vigor2925acscope:ltversion:3.9.4

Trust: 1.0

vendor:draytekmodel:vigor2862lacscope:ltversion:3.9.9.1

Trust: 1.0

vendor:draytekmodel:vigor2133scope:ltversion:3.9.6.5

Trust: 1.0

vendor:draytekmodel:vigor2927lscope:ltversion:4.4.2.3

Trust: 1.0

vendor:draytekmodel:vigor2962pscope:ltversion:4.3.2.2

Trust: 1.0

vendor:draytekmodel:vigor2862vacscope:ltversion:3.9.9.1

Trust: 1.0

vendor:draytekmodel:vigor2862lscope:ltversion:3.9.9.1

Trust: 1.0

vendor:draytekmodel:vigor2927scope:ltversion:4.4.2.3

Trust: 1.0

vendor:draytekmodel:vigor2927fscope:ltversion:4.4.2.3

Trust: 1.0

vendor:draytekmodel:vigor2832nscope:ltversion:3.9.6.3

Trust: 1.0

vendor:draytekmodel:vigor2925n-plusscope:ltversion:3.9.4

Trust: 1.0

vendor:draytekmodel:vigor2832nscope: - version: -

Trust: 0.8

vendor:draytekmodel:vigor2766vacscope: - version: -

Trust: 0.8

vendor:draytekmodel:vigor2832scope: - version: -

Trust: 0.8

vendor:draytekmodel:vigor2860scope: - version: -

Trust: 0.8

vendor:draytekmodel:vigor2765axscope: - version: -

Trust: 0.8

vendor:draytekmodel:vigor2765vascope: - version: -

Trust: 0.8

vendor:draytekmodel:vigor2860vacscope: - version: -

Trust: 0.8

vendor:draytekmodel:vigor2766acscope: - version: -

Trust: 0.8

vendor:draytekmodel:vigor2860n-plusscope: - version: -

Trust: 0.8

vendor:draytekmodel:vigor2860acscope: - version: -

Trust: 0.8

vendor:draytekmodel:vigor2766axscope: - version: -

Trust: 0.8

vendor:draytekmodel:vigor2860vn-plusscope: - version: -

Trust: 0.8

vendor:draytekmodel:vigor2763scope: - version: -

Trust: 0.8

vendor:draytekmodel:vigor2860nscope: - version: -

Trust: 0.8

vendor:draytekmodel:vigor2860lscope: - version: -

Trust: 0.8

vendor:draytekmodel:vigor2860lnscope: - version: -

Trust: 0.8

vendor:draytekmodel:vigor2765scope: - version: -

Trust: 0.8

vendor:draytekmodel:vigor2763acscope: - version: -

Trust: 0.8

vendor:draytekmodel:vigor2765acscope: - version: -

Trust: 0.8

vendor:draytekmodel:vigor2766scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2023-004845 // NVD: CVE-2023-23313

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-23313
value: MEDIUM

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2023-23313
value: MEDIUM

Trust: 1.0

NVD: CVE-2023-23313
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202303-232
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2023-23313
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 2.7
version: 3.1

Trust: 2.0

NVD: CVE-2023-23313
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNNVD: CNNVD-202303-232 // JVNDB: JVNDB-2023-004845 // NVD: CVE-2023-23313 // NVD: CVE-2023-23313

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.0

problemtype:Cross-site scripting (CWE-79) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-004845 // NVD: CVE-2023-23313

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202303-232

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-202303-232

PATCH

title:DrayTek Vigor routers Fixes for cross-site scripting vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=228531

Trust: 0.6

sources: CNNVD: CNNVD-202303-232

EXTERNAL IDS

db:NVDid:CVE-2023-23313

Trust: 3.3

db:JVNDBid:JVNDB-2023-004845

Trust: 0.8

db:CNNVDid:CNNVD-202303-232

Trust: 0.6

db:VULMONid:CVE-2023-23313

Trust: 0.1

sources: VULMON: CVE-2023-23313 // CNNVD: CNNVD-202303-232 // JVNDB: JVNDB-2023-004845 // NVD: CVE-2023-23313

REFERENCES

url:https://www.horizonconsulting.com/advisories23-multiple-xss-stored-in-draytek-routers-cve-2023-23313

Trust: 2.4

url:https://www.draytek.com/about/security-advisory/cross-site-scripting-vulnerability-(cve-2023-23313)/

Trust: 1.5

url:https://www.draytek.com/about/security-advisory/cross-site-scripting-vulnerability-%28cve-2023-23313%29/

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2023-23313

Trust: 0.8

url:https://www.horizonsecurity.it/lang_en/advisories/?a=22&title=multiple+xss+stored+in+draytek+routers+web+interface++cve202323313

Trust: 0.7

url:http://vigor3910vigor1000bvigor2962.com

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2023-23313/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2023-23313 // CNNVD: CNNVD-202303-232 // JVNDB: JVNDB-2023-004845 // NVD: CVE-2023-23313

SOURCES

db:VULMONid:CVE-2023-23313
db:CNNVDid:CNNVD-202303-232
db:JVNDBid:JVNDB-2023-004845
db:NVDid:CVE-2023-23313

LAST UPDATE DATE

2025-10-09T23:02:19.523000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2023-23313date:2023-03-06T00:00:00
db:CNNVDid:CNNVD-202303-232date:2023-05-22T00:00:00
db:JVNDBid:JVNDB-2023-004845date:2023-11-02T04:46:00
db:NVDid:CVE-2023-23313date:2025-10-07T19:00:07.737

SOURCES RELEASE DATE

db:VULMONid:CVE-2023-23313date:2023-03-03T00:00:00
db:CNNVDid:CNNVD-202303-232date:2023-03-03T00:00:00
db:JVNDBid:JVNDB-2023-004845date:2023-11-02T00:00:00
db:NVDid:CVE-2023-23313date:2023-03-03T22:15:09.690