ID

VAR-202602-2386


CVE

CVE-2026-3040


TITLE

DrayTek Corporation of Vigor300b  Multiple vulnerabilities in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2026-005576

DESCRIPTION

A vulnerability was identified in DrayTek Vigor 300B up to 1.5.1.6. This affects the function cgiGetFile of the file /cgi-bin/mainfunction.cgi/uploadlangs of the component Web Management Interface. The manipulation of the argument File leads to os command injection. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor confirms that "300B is EoL, and this is an authenticated vulnerability. We don't plan to fix it." This vulnerability only affects products that are no longer supported by the maintainer. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software

Trust: 1.62

sources: NVD: CVE-2026-3040 // JVNDB: JVNDB-2026-005576

AFFECTED PRODUCTS

vendor:draytekmodel:vigor300bscope:lteversion:1.5.1.6

Trust: 1.0

vendor:draytekmodel:vigor300bscope:eqversion: -

Trust: 0.8

vendor:draytekmodel:vigor300bscope:lteversion:vigor300b firmware 1.5.1.6 and earlier

Trust: 0.8

vendor:draytekmodel:vigor300bscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2026-005576 // NVD: CVE-2026-3040

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2026-3040
value: LOW

Trust: 1.0

nvd@nist.gov: CVE-2026-3040
value: HIGH

Trust: 1.0

OTHER: JVNDB-2026-005576
value: HIGH

Trust: 0.8

cna@vuldb.com: CVE-2026-3040
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:L/AU:M/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: MULTIPLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.4
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2026-005576
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:L/AU:M/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: MULTIPLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

cna@vuldb.com: CVE-2026-3040
baseSeverity: MEDIUM
baseScore: 4.7
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 1.2
impactScore: 3.4
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2026-3040
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2026-005576
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2026-005576 // NVD: CVE-2026-3040 // NVD: CVE-2026-3040

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [ others ]

Trust: 0.8

problemtype:OS Command injection (CWE-78) [NVD evaluation ]

Trust: 0.8

problemtype:OS Command injection (CWE-78) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2026-005576 // NVD: CVE-2026-3040

PATCH

title:DrayTek Vigor 300B v1.5.1.6 OS Command Injectionurl:https://vuldb.com/?id.347394

Trust: 0.8

sources: JVNDB: JVNDB-2026-005576

EXTERNAL IDS

db:NVDid:CVE-2026-3040

Trust: 2.6

db:VULDBid:347394

Trust: 1.0

db:JVNDBid:JVNDB-2026-005576

Trust: 0.8

sources: JVNDB: JVNDB-2026-005576 // NVD: CVE-2026-3040

REFERENCES

url:https://github.com/master-abc/cve/issues/42

Trust: 1.8

url:https://vuldb.com/?submit.757126

Trust: 1.0

url:https://vuldb.com/?ctiid.347394

Trust: 1.0

url:https://vuldb.com/?id.347394

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2026-3040

Trust: 0.8

sources: JVNDB: JVNDB-2026-005576 // NVD: CVE-2026-3040

SOURCES

db:JVNDBid:JVNDB-2026-005576
db:NVDid:CVE-2026-3040

LAST UPDATE DATE

2026-03-04T23:40:33.738000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2026-005576date:2026-03-02T09:47:00
db:NVDid:CVE-2026-3040date:2026-02-26T16:11:00.327

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2026-005576date:2026-03-02T00:00:00
db:NVDid:CVE-2026-3040date:2026-02-23T22:16:25.960