CVE-2024-46589
📋 TL;DR
A buffer overflow vulnerability in Draytek Vigor 3910 routers allows attackers to cause Denial of Service (DoS) by sending crafted input to the sIpv6AiccuUser parameter. This affects organizations using Draytek Vigor 3910 routers with vulnerable firmware versions. The vulnerability is remotely exploitable without authentication.
💻 Affected Systems
- Draytek Vigor 3910
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete router crash requiring physical reboot, potential for remote code execution if buffer overflow can be controlled precisely
Likely Case
Router becomes unresponsive requiring reboot, disrupting network connectivity for all connected devices
If Mitigated
Limited to isolated network segment with no internet exposure
🎯 Exploit Status
Based on CWE-120 (Buffer Copy without Checking Size of Input), exploitation likely requires sending oversized input to specific parameter
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available in provided references
Restart Required: Yes
Instructions:
1. Check Draytek website for firmware updates
2. Download latest firmware for Vigor 3910
3. Upload via web interface
4. Reboot router after installation
🔧 Temporary Workarounds
Disable IPv6 AICCU functionality
allDisable the specific IPv6 AICCU feature that uses the vulnerable inetipv6.cgi component
Restrict access to management interface
allLimit access to router web interface to trusted IP addresses only
🧯 If You Can't Patch
- Segment network to isolate Vigor 3910 from untrusted networks
- Implement strict firewall rules blocking external access to router management interface
🔍 How to Verify
Check if Vulnerable:
Check router firmware version via web interface: System Maintenance > Firmware Information
Check Version:
No CLI command - check via web interface or SNMP
Verify Fix Applied:
Verify firmware version is newer than v4.3.2.6 after update
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to /inetipv6.cgi with large sIpv6AiccuUser parameter
- Router crash/reboot events in system logs
Network Indicators:
- Unusual HTTP POST requests to router management interface
- Sudden loss of connectivity from router
SIEM Query:
source="router_logs" AND (uri="/inetipv6.cgi" AND param_size>1000) OR event="router_reboot"