📦 Vigor2620 Firmware
by Draytek
🔍 What is Vigor2620 Firmware?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
A critical stack-based buffer overflow vulnerability in DrayTek router TR069 STUN server URL parsing allows remote attackers to execute arbitrary code with elevated privileges. This affects multiple D...
CVE-2024-41593 is a critical heap-based buffer overflow vulnerability in DrayTek Vigor310 devices that allows remote attackers to execute arbitrary code. The vulnerability occurs due to sign-extension...
This vulnerability allows attackers to send crafted payloads to the user_login.cgi endpoint on affected Draytek Vigor devices, enabling arbitrary code execution by modifying memory segments and insert...
A NULL pointer dereference vulnerability in multiple Draytek router models allows attackers to cause Denial of Service (DoS) via specially crafted DHCP requests. This affects organizations and individ...
This vulnerability allows attackers to upload malicious kernel modules through the CGI configuration upload endpoint in affected Draytek routers, leading to arbitrary code execution with root privileg...
This vulnerability in Draytek routers allows attackers to upload malicious APP Enforcement modules, leading to arbitrary code execution with root privileges. It affects multiple Draytek Vigor router m...
This vulnerability allows authenticated users to exploit buffer overflows in DrayTek Vigor3910 devices by sending specially crafted POST requests to vulnerable CGI endpoints. Attackers could potential...
This vulnerability allows authenticated users to exploit buffer overflows in CGI endpoints on DrayTek Vigor310 devices by sending specially crafted POST requests. Attackers could potentially execute a...
DrayTek Vigor3910 devices have a stack-based buffer overflow vulnerability in the GetCGI function that processes query string parameters. Attackers can exploit this by sending specially crafted HTTP r...