CVE-2023-24229

7.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers with network access to the DrayTek Vigor2960 web management interface to execute arbitrary operating system commands via the 'parameter' parameter in mainfunction.cgi. It affects DrayTek Vigor2960 devices running version 1.5.1.4 that are no longer supported by the vendor.

💻 Affected Systems

Products:
  • DrayTek Vigor2960
Versions: v1.5.1.4
Operating Systems: Embedded OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects products no longer supported by DrayTek. Requires authenticated access to web management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the device leading to network pivoting, data exfiltration, or deployment of persistent malware on the network.

🟠

Likely Case

Unauthorized command execution allowing attackers to modify device configuration, intercept traffic, or disrupt network services.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent unauthorized access to the management interface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires valid credentials for web interface. Public proof-of-concept exists in GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://www.draytek.com/about/newsroom/2021/2021/end-of-life-notification-vigor2960

Restart Required: No

Instructions:

No official patch available as product is end-of-life. Replace with supported hardware.

🔧 Temporary Workarounds

Restrict Management Interface Access

all

Limit access to the web management interface to trusted IP addresses only using firewall rules.

Disable Unused Management Features

all

Disable remote management features if not required for operations.

🧯 If You Can't Patch

  • Replace affected devices with supported hardware
  • Implement strict network segmentation to isolate vulnerable devices

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface at System Maintenance > Firmware Information

Check Version:

N/A - check via web interface

Verify Fix Applied:

Verify device has been replaced with supported hardware or isolated from network

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to mainfunction.cgi with parameter parameter
  • Multiple failed login attempts followed by successful login and command execution

Network Indicators:

  • Unusual outbound connections from router to external IPs
  • Traffic patterns indicating command and control activity

SIEM Query:

source="vigor2960" AND (uri="*mainfunction.cgi*" AND param="parameter")

🔗 References

📤 Share & Export