ID

VAR-202412-2377


CVE

CVE-2024-12986


TITLE

DrayTek Corporation  of  Vigor300b  firmware and  Vigor2960  Command injection vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2024-024287

DESCRIPTION

A vulnerability, which was classified as critical, has been found in DrayTek Vigor2960 and Vigor300B 1.5.1.3/1.5.1.4. This issue affects some unknown processing of the file /cgi-bin/mainfunction.cgi/apmcfgupptim of the component Web Management Interface. The manipulation of the argument session leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component. DrayTek Corporation of Vigor300b firmware and Vigor2960 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.62

sources: NVD: CVE-2024-12986 // JVNDB: JVNDB-2024-024287

AFFECTED PRODUCTS

vendor:draytekmodel:vigor2960scope:gteversion:1.5.1.3

Trust: 1.0

vendor:draytekmodel:vigor300bscope:gteversion:1.5.1.3

Trust: 1.0

vendor:draytekmodel:vigor300bscope:ltversion:1.5.1.5

Trust: 1.0

vendor:draytekmodel:vigor2960scope:ltversion:1.5.1.5

Trust: 1.0

vendor:draytekmodel:vigor2960scope: - version: -

Trust: 0.8

vendor:draytekmodel:vigor300bscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2024-024287 // NVD: CVE-2024-12986

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2024-12986
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2024-12986
value: CRITICAL

Trust: 1.0

OTHER: JVNDB-2024-024287
value: CRITICAL

Trust: 0.8

cna@vuldb.com: CVE-2024-12986
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2024-024287
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

cna@vuldb.com: CVE-2024-12986
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 3.4
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2024-12986
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2024-024287
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2024-024287 // NVD: CVE-2024-12986 // NVD: CVE-2024-12986

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [NVD evaluation ]

Trust: 0.8

problemtype: Command injection (CWE-77) [ others ]

Trust: 0.8

problemtype:OS Command injection (CWE-78) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-024287 // NVD: CVE-2024-12986

EXTERNAL IDS

db:NVDid:CVE-2024-12986

Trust: 2.6

db:VULDBid:289379

Trust: 1.8

db:JVNDBid:JVNDB-2024-024287

Trust: 0.8

sources: JVNDB: JVNDB-2024-024287 // NVD: CVE-2024-12986

REFERENCES

url:https://netsecfish.notion.site/command-injection-in-apmcfgupptim-endpoint-for-draytek-gateway-devices-1676b683e67c80b9ad8cc37b93273bf6?pvs=4

Trust: 1.8

url:https://vuldb.com/?id.289379

Trust: 1.8

url:https://vuldb.com/?submit.468794

Trust: 1.8

url:https://vuldb.com/?ctiid.289379

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2024-12986

Trust: 0.8

sources: JVNDB: JVNDB-2024-024287 // NVD: CVE-2024-12986

SOURCES

db:JVNDBid:JVNDB-2024-024287
db:NVDid:CVE-2024-12986

LAST UPDATE DATE

2025-05-30T23:22:03.827000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2024-024287date:2025-05-29T02:21:00
db:NVDid:CVE-2024-12986date:2025-05-28T20:21:24.453

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2024-024287date:2025-05-29T00:00:00
db:NVDid:CVE-2024-12986date:2024-12-27T16:15:23.927