CVE-2024-46552
📋 TL;DR
A buffer overflow vulnerability in Draytek Vigor 3910 routers allows attackers to cause Denial of Service (DoS) by sending crafted input to the sStRtMskShow parameter. This affects organizations using Draytek Vigor 3910 routers with vulnerable firmware versions. The vulnerability is exploitable remotely without authentication.
💻 Affected Systems
- Draytek Vigor 3910
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete router crash requiring physical reboot, extended network downtime, and potential for remote code execution if the overflow can be controlled precisely.
Likely Case
Router becomes unresponsive, requiring reboot and causing temporary network disruption for connected users and services.
If Mitigated
Limited impact if routers are behind firewalls with strict inbound filtering, though internal threats remain.
🎯 Exploit Status
Buffer overflow in web interface parameter suggests straightforward exploitation via HTTP requests.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: Yes
Instructions:
1. Check Draytek website for firmware updates. 2. Download latest firmware. 3. Upload via web admin interface. 4. Reboot router after update.
🔧 Temporary Workarounds
Restrict Access to Web Interface
allLimit access to router's web administration interface to trusted IP addresses only.
Configure firewall rules to allow only specific source IPs to TCP ports 80/443 on router
Disable Remote Administration
allTurn off remote administration features if not required.
Login to router admin > System Maintenance > Remote Management > Disable
🧯 If You Can't Patch
- Place router behind additional firewall with strict inbound filtering
- Monitor router logs for unusual HTTP requests to ipstrt.cgi
🔍 How to Verify
Check if Vulnerable:
Check firmware version in router web interface under System Status > Firmware Information
Check Version:
curl -k https://router-ip/cgi-bin/status.cgi | grep Firmware
Verify Fix Applied:
Verify firmware version is newer than v4.3.2.6 after update
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to /cgi-bin/ipstrt.cgi with unusual parameter values
- Router crash/reboot events in system logs
Network Indicators:
- HTTP POST requests to router IP with sStRtMskShow parameter containing long strings
SIEM Query:
source="router_logs" AND (uri="/cgi-bin/ipstrt.cgi" OR message="reboot" OR message="crash")