Lucene search

K
cve[email protected]CVE-2023-1162
HistoryMar 03, 2023 - 7:15 a.m.

CVE-2023-1162

2023-03-0307:15:09
CWE-77
web.nvd.nist.gov
23
cve-2023-1162
draytek
vigor 2960
command injection
remote attack
critical vulnerability

8.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

MULTIPLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:M/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9.1 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.2%

UNSUPPORTED WHEN ASSIGNED A vulnerability, which was classified as critical, was found in DrayTek Vigor 2960 1.5.1.4/1.5.1.5. Affected is an unknown function of the file mainfunction.cgi of the component Web Management Interface. The manipulation of the argument password leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-222258 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

Affected configurations

Vulners
NVD
Node
draytekvigor_2960Match1.5.1.4
OR
draytekvigor_2960Match1.5.1.5
VendorProductVersionCPE
draytekvigor_29601.5.1.4cpe:2.3:h:draytek:vigor_2960:1.5.1.4:*:*:*:*:*:*:*
draytekvigor_29601.5.1.5cpe:2.3:h:draytek:vigor_2960:1.5.1.5:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "DrayTek",
    "product": "Vigor 2960",
    "versions": [
      {
        "version": "1.5.1.4",
        "status": "affected"
      },
      {
        "version": "1.5.1.5",
        "status": "affected"
      }
    ],
    "modules": [
      "Web Management Interface"
    ]
  }
]

8.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

MULTIPLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:M/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9.1 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.2%

Related for CVE-2023-1162