CVE-2024-12987 Scanner

CVE-2024-12987 Scanner - Command Injection vulnerability in DrayTek Vigor

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

8 days 9 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

-

DrayTek Vigor is a series of networking devices primarily used in small to medium-sized business environments. Known for their reliability, these devices offer functions such as routing, VPN, and network management. Network administrators use these devices to maintain secure and efficient network connections. The DrayTek Vigor devices, such as Vigor2960 and Vigor300B, provide vital networking functions and are integrated into various IT infrastructures. They are popular choices for organizations in need of stable and secure network operational capabilities. These devices' wide usage makes them frequent targets for security researchers and, unfortunately, cyber attackers.

Command Injection is a critical vulnerability that allows attackers to execute arbitrary system commands on a host server using vulnerable applications. In the context of DrayTek Vigor devices, this vulnerability emerges within the /cgi-bin/mainfunction.cgi/apmcfgupload endpoint. Attackers leverage the session parameter to inject malicious commands that the host system could execute. This vulnerability allows attackers to seize control of the device, potentially compromising network traffic or accessing sensitive data. Given its critical nature, it is crucial to address Command Injection vulnerabilities promptly to protect the integrity of the network.

The technical details of the Command Injection vulnerability involve manipulating the session parameter in the HTTP requests sent to the DrayTek Vigor's /cgi-bin/mainfunction.cgi/apmcfgupload endpoint. Malicious actors can craft requests to inject and execute commands by utilizing specific character sequences and escape characters. The vulnerability stems from improper handling and sanitation of inputs by the network device's software, allowing injected commands to bypass security controls. It is tested by sending tailor-made requests to see if the vulnerable endpoint executes these injected commands.

Exploiting this Command Injection vulnerability could lead to severe consequences, including unauthorized access to the device, data breaches, and network disruptions. Potential effects encompass the execution of arbitrary commands, which may allow attackers to capture sensitive information, alter device configurations, or create persistent back doors for future access. Compromised devices might become part of a larger botnet, posing risks beyond the immediate network of the affected organization. If left unaddressed, the vulnerability can significantly weaken the network's security posture, facilitating further attacks.

REFERENCES

Get started to protecting your digital assets