Vulnerabilites related to draytek - vigor2860
var-202410-0186
Vulnerability from variot

DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS. vigor2620 firmware, vigor2915 firmware, vigor2866 firmware etc. DrayTek Corporation A cross-site scripting vulnerability exists in the product.Information may be obtained and information may be tampered with

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202410-0186",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "vigor2866",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.2"
      },
      {
        "model": "vigor3910",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.3.1"
      },
      {
        "model": "vigor3912",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.3.6.1"
      },
      {
        "model": "vigor3910",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.3.2.8"
      },
      {
        "model": "vigor2832",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2860",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2962",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.3.1"
      },
      {
        "model": "vigor165",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.2.7"
      },
      {
        "model": "vigor2925",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2763",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.3"
      },
      {
        "model": "vigor2962",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.3.2.8"
      },
      {
        "model": "vigor2915",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.3"
      },
      {
        "model": "vigorlte200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2926",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor3220",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2135",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.3"
      },
      {
        "model": "vigor2952",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2762",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2865",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.2"
      },
      {
        "model": "vigor2962",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.0.0"
      },
      {
        "model": "vigor2765",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.3"
      },
      {
        "model": "vigor2620",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2766",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.3"
      },
      {
        "model": "vigor1000b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.3.1"
      },
      {
        "model": "vigor2862",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor3910",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.0.0"
      },
      {
        "model": "vigor166",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.2.7"
      },
      {
        "model": "vigor1000b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.3.2.8"
      },
      {
        "model": "vigor2133",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor1000b",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.0.0"
      },
      {
        "model": "vigor2766",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2866",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2765",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2865",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor165",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2962",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor3910",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2133",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2762",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigorlte200",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor1000b",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2915",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor3912",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2620",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2763",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2135",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor166",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009985"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-41591"
      }
    ]
  },
  "cve": "CVE-2024-41591",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 2.8,
            "id": "CVE-2024-41591",
            "impactScore": 2.7,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 6.1,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "CVE-2024-41591",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Changed",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2024-41591",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2024-41591",
            "trust": 0.8,
            "value": "Medium"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009985"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-41591"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS. vigor2620 firmware, vigor2915 firmware, vigor2866 firmware etc. DrayTek Corporation A cross-site scripting vulnerability exists in the product.Information may be obtained and information may be tampered with",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2024-41591"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009985"
      }
    ],
    "trust": 1.62
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2024-41591",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009985",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009985"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-41591"
      }
    ]
  },
  "id": "VAR-202410-0186",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.6666667
  },
  "last_update_date": "2024-10-11T23:01:21.952000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-79",
        "trust": 1.0
      },
      {
        "problemtype": "Cross-site scripting (CWE-79) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009985"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-41591"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://www.forescout.com/resources/draybreak-draytek-research/"
      },
      {
        "trust": 1.0,
        "url": "https://www.forescout.com/resources/draytek14-vulnerabilities"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2024-41591"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009985"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-41591"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009985"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-41591"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2024-10-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2024-009985"
      },
      {
        "date": "2024-10-03T19:15:04.560000",
        "db": "NVD",
        "id": "CVE-2024-41591"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2024-10-09T01:14:00",
        "db": "JVNDB",
        "id": "JVNDB-2024-009985"
      },
      {
        "date": "2024-10-08T15:34:46.453000",
        "db": "NVD",
        "id": "CVE-2024-41591"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural \u00a0DrayTek\u00a0Corporation\u00a0 Cross-site scripting vulnerability in the product",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009985"
      }
    ],
    "trust": 0.8
  }
}

var-202410-0179
Vulnerability from variot

An issue in DrayTek Vigor310 devices through 4.3.2.6 allows an attacker to obtain sensitive information because the httpd server of the Vigor management UI uses a static string for seeding the PRNG of OpenSSL. vigor2620 firmware, vigor2915 firmware, vigor2866 firmware etc. DrayTek Corporation The product contains a cryptographic strength vulnerability.Information may be obtained

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202410-0179",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "vigor2866",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.2"
      },
      {
        "model": "vigor3910",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.3.1"
      },
      {
        "model": "vigor3912",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.3.6.1"
      },
      {
        "model": "vigor3910",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.3.2.8"
      },
      {
        "model": "vigor2832",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2860",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2962",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.3.1"
      },
      {
        "model": "vigor165",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.2.7"
      },
      {
        "model": "vigor2925",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2763",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.3"
      },
      {
        "model": "vigor2962",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.3.2.8"
      },
      {
        "model": "vigor2915",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.3"
      },
      {
        "model": "vigorlte200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2926",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor3220",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2135",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.3"
      },
      {
        "model": "vigor2952",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2762",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2865",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.2"
      },
      {
        "model": "vigor2962",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.0.0"
      },
      {
        "model": "vigor2765",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.3"
      },
      {
        "model": "vigor2620",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2766",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.3"
      },
      {
        "model": "vigor1000b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.3.1"
      },
      {
        "model": "vigor2862",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor3910",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.0.0"
      },
      {
        "model": "vigor166",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.2.7"
      },
      {
        "model": "vigor1000b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.3.2.8"
      },
      {
        "model": "vigor2133",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor1000b",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.0.0"
      },
      {
        "model": "vigor2766",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2866",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2765",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2865",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor165",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2962",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor3910",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2133",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2762",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigorlte200",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor1000b",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2915",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor3912",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2620",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2763",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2135",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor166",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009984"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-41594"
      }
    ]
  },
  "cve": "CVE-2024-41594",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2024-41594",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2024-41594",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2024-41594",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2024-41594",
            "trust": 0.8,
            "value": "High"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009984"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-41594"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An issue in DrayTek Vigor310 devices through 4.3.2.6 allows an attacker to obtain sensitive information because the httpd server of the Vigor management UI uses a static string for seeding the PRNG of OpenSSL. vigor2620 firmware, vigor2915 firmware, vigor2866 firmware etc. DrayTek Corporation The product contains a cryptographic strength vulnerability.Information may be obtained",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2024-41594"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009984"
      }
    ],
    "trust": 1.62
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2024-41594",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009984",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009984"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-41594"
      }
    ]
  },
  "id": "VAR-202410-0179",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.6666667
  },
  "last_update_date": "2024-10-10T23:21:46.664000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-326",
        "trust": 1.0
      },
      {
        "problemtype": "Inappropriate cryptographic strength (CWE-326) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009984"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-41594"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://www.forescout.com/resources/draybreak-draytek-research/"
      },
      {
        "trust": 1.0,
        "url": "https://www.forescout.com/resources/draytek14-vulnerabilities"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2024-41594"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009984"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-41594"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009984"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-41594"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2024-10-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2024-009984"
      },
      {
        "date": "2024-10-03T19:15:04.800000",
        "db": "NVD",
        "id": "CVE-2024-41594"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2024-10-09T01:14:00",
        "db": "JVNDB",
        "id": "JVNDB-2024-009984"
      },
      {
        "date": "2024-10-08T15:31:47.907000",
        "db": "NVD",
        "id": "CVE-2024-41594"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural \u00a0DrayTek\u00a0Corporation\u00a0 Vulnerability related to encryption strength in products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009984"
      }
    ],
    "trust": 0.8
  }
}

var-202410-0281
Vulnerability from variot

DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow. vigor3912 firmware, vigor2962 firmware, vigor3910 firmware etc. DrayTek Corporation The product contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202410-0281",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "vigor3912",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.3.6.1"
      },
      {
        "model": "vigor3910",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.3.1"
      },
      {
        "model": "vigor2866",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.2"
      },
      {
        "model": "vigor3910",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.3.2.8"
      },
      {
        "model": "vigor2832",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2860",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2962",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.3.1"
      },
      {
        "model": "vigor165",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.2.7"
      },
      {
        "model": "vigor2925",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2763",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.3"
      },
      {
        "model": "vigor2962",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.3.2.8"
      },
      {
        "model": "vigor2915",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.3"
      },
      {
        "model": "vigorlte200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2926",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor3220",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2135",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.3"
      },
      {
        "model": "vigor2952",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2762",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2865",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.2"
      },
      {
        "model": "vigor2962",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.0.0"
      },
      {
        "model": "vigor2765",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.3"
      },
      {
        "model": "vigor2620",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2766",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.3"
      },
      {
        "model": "vigor1000b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.3.1"
      },
      {
        "model": "vigor2862",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor3910",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.0.0"
      },
      {
        "model": "vigor1000b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.3.2.8"
      },
      {
        "model": "vigor166",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.2.7"
      },
      {
        "model": "vigor2133",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor1000b",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.0.0"
      },
      {
        "model": "vigor2766",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2866",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2765",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2865",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor165",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2962",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor3910",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2133",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2762",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigorlte200",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor1000b",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2915",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor3912",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2620",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2763",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor2135",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor166",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009968"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-41593"
      }
    ]
  },
  "cve": "CVE-2024-41593",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2024-41593",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2024-41593",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2024-41593",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2024-41593",
            "trust": 0.8,
            "value": "Critical"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009968"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-41593"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow. vigor3912 firmware, vigor2962 firmware, vigor3910 firmware etc. DrayTek Corporation The product contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2024-41593"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009968"
      }
    ],
    "trust": 1.62
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2024-41593",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009968",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009968"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-41593"
      }
    ]
  },
  "id": "VAR-202410-0281",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.6666667
  },
  "last_update_date": "2024-10-13T23:21:57.296000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.0
      },
      {
        "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009968"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-41593"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://www.forescout.com/resources/draybreak-draytek-research/"
      },
      {
        "trust": 1.0,
        "url": "https://www.forescout.com/resources/draytek14-vulnerabilities"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2024-41593"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009968"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-41593"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009968"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-41593"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2024-10-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2024-009968"
      },
      {
        "date": "2024-10-03T19:15:04.740000",
        "db": "NVD",
        "id": "CVE-2024-41593"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2024-10-09T00:45:00",
        "db": "JVNDB",
        "id": "JVNDB-2024-009968"
      },
      {
        "date": "2024-10-08T15:35:04.583000",
        "db": "NVD",
        "id": "CVE-2024-41593"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural \u00a0DrayTek\u00a0Corporation\u00a0 Out-of-bounds write vulnerabilities in the product",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009968"
      }
    ],
    "trust": 0.8
  }
}

var-202410-0075
Vulnerability from variot

Stored XSS, by authenticated users, is caused by poor sanitization of the Login Page Greeting message in DrayTek Vigor310 devices through 4.3.2.6. DrayTek Corporation of vigor3910 Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202410-0075",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "vigor3912",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.3.6.1"
      },
      {
        "model": "vigor3910",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.3.1"
      },
      {
        "model": "vigor2866",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.2"
      },
      {
        "model": "vigor3910",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.3.2.8"
      },
      {
        "model": "vigor2832",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2860",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2962",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.3.1"
      },
      {
        "model": "vigor165",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.2.7"
      },
      {
        "model": "vigor2925",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2763",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.3"
      },
      {
        "model": "vigor2962",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.3.2.8"
      },
      {
        "model": "vigor2915",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.3"
      },
      {
        "model": "vigorlte200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2926",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor3220",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2135",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.3"
      },
      {
        "model": "vigor2952",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2762",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2865",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.2"
      },
      {
        "model": "vigor2962",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.0.0"
      },
      {
        "model": "vigor2765",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.3"
      },
      {
        "model": "vigor2620",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor2766",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.5.3"
      },
      {
        "model": "vigor1000b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.3.1"
      },
      {
        "model": "vigor2862",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor3910",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.0.0"
      },
      {
        "model": "vigor1000b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.3.2.8"
      },
      {
        "model": "vigor166",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.2.7"
      },
      {
        "model": "vigor2133",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "*"
      },
      {
        "model": "vigor1000b",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "draytek",
        "version": "4.4.0.0"
      },
      {
        "model": "vigor3910",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "draytek",
        "version": "vigor3910  firmware  4.3.2.8"
      },
      {
        "model": "vigor3910",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "draytek",
        "version": "vigor3910  firmware  4.4.0.0  that\u0027s all  4.4.3.1"
      },
      {
        "model": "vigor3910",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      },
      {
        "model": "vigor3910",
        "scope": null,
        "trust": 0.8,
        "vendor": "draytek",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009832"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-41587"
      }
    ]
  },
  "cve": "CVE-2024-41587",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 2.3,
            "id": "CVE-2024-41587",
            "impactScore": 2.7,
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.4,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "CVE-2024-41587",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "Low",
            "scope": "Changed",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2024-41587",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2024-41587",
            "trust": 0.8,
            "value": "Medium"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009832"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-41587"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Stored XSS, by authenticated users, is caused by poor sanitization of the Login Page Greeting message in DrayTek Vigor310 devices through 4.3.2.6. DrayTek Corporation of vigor3910 Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2024-41587"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009832"
      }
    ],
    "trust": 1.62
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2024-41587",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009832",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009832"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-41587"
      }
    ]
  },
  "id": "VAR-202410-0075",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.6666667
  },
  "last_update_date": "2024-10-08T23:27:00.949000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-79",
        "trust": 1.0
      },
      {
        "problemtype": "Cross-site scripting (CWE-79) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009832"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-41587"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://www.forescout.com/resources/draybreak-draytek-research/"
      },
      {
        "trust": 1.0,
        "url": "https://www.forescout.com/resources/draytek14-vulnerabilities"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2024-41587"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009832"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-41587"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009832"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-41587"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2024-10-07T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2024-009832"
      },
      {
        "date": "2024-10-03T19:15:04.310000",
        "db": "NVD",
        "id": "CVE-2024-41587"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2024-10-07T03:05:00",
        "db": "JVNDB",
        "id": "JVNDB-2024-009832"
      },
      {
        "date": "2024-10-08T15:32:18.313000",
        "db": "NVD",
        "id": "CVE-2024-41587"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "DrayTek\u00a0Corporation\u00a0 of \u00a0vigor3910\u00a0 Cross-site scripting vulnerability in firmware",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-009832"
      }
    ],
    "trust": 0.8
  }
}

Vulnerability from fkie_nvd
Published
2024-10-03 19:15
Modified
2024-10-08 15:34
Summary
DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "289E3E0B-6BA4-44B8-968A-AC374B15B631",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D98663B-F2F5-4ADC-9FD5-75846890EEBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6E55BCE-BBF0-454B-AE86-45B7298888B3",
              "versionEndExcluding": "4.4.5.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5860CBE4-328E-418D-9E81-1D3AF7DB8F2B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89461FD4-897D-44F1-8486-4BCCDE3772DD",
              "versionEndExcluding": "4.4.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F87D851-15BC-4FC1-8AB7-D5C15B2B74F0",
              "versionEndExcluding": "4.4.5.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3D46DEC-06AB-489F-A0B5-10C31F80A8C1",
              "versionEndExcluding": "4.4.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B1826F9-0258-44DD-A471-113CF55CE563",
              "versionEndExcluding": "4.4.5.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A559F44-80F8-44B7-B70F-BA0B78C85283",
              "versionEndExcluding": "4.4.5.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EA9DF5D-6651-455A-9305-C42C0FF51F01",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4AB3320-27F8-4359-AEF8-6B1FDBA67111",
              "versionEndExcluding": "4.4.5.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "08B9436B-B2FE-4644-BB06-B0537EC23A71",
              "versionEndExcluding": "4.2.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDBC681E-CD03-49E5-BC3A-E4A7654975A3",
              "versionEndExcluding": "4.3.2.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABDC93B5-DC0A-4AA4-A340-382F108AE80B",
              "versionEndExcluding": "4.4.3.1",
              "versionStartIncluding": "4.4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FF86645-253A-4BA3-BA2A-2725575C390D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59521C99-00BA-4503-823E-3FEA44F8DDA0",
              "versionEndExcluding": "4.2.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B937F11C-FC86-4D6E-A46B-BA2CA0FFCEF7",
              "versionEndExcluding": "4.3.2.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2602941C-255F-4289-9043-D396CC4B3192",
              "versionEndExcluding": "4.4.3.1",
              "versionStartIncluding": "4.4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0549C870-BE10-441A-B07D-0701915E5A9E",
              "versionEndExcluding": "4.3.2.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D1A9825-E419-4740-996A-5928D207FCB6",
              "versionEndExcluding": "4.4.3.1",
              "versionStartIncluding": "4.4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "84670562-F228-40A0-A38D-144EA62556D3",
              "versionEndExcluding": "4.3.6.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "282E5318-DAA8-4AA2-8E7D-4B8BD9162153",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BD8E59-6C67-4C80-B25F-2C5814A8CF0E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "43265128-7E8E-4FE2-8488-AC5734A4AF70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52F71B18-89B5-42C7-B4B7-448844D6AFBC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A96F64C0-09DD-4553-AC5F-D722B8321B0D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C4077B-C73F-4431-9103-C09960E203E1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D081E5D-7A68-47A0-9EFE-1FC01DA2FF23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C470B04-BD57-429B-80FC-328A7D2E35E5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A688631-4B36-43CC-AEF8-D390081F01DC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E207BB52-29F8-4F2F-AA06-855B38E22958",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167336E2-AAA8-4424-AB07-2D7C9E1542B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8437FD-65E2-4203-82B9-8FC32444204A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64955940-3998-4B76-92D1-D9F3FAB874B4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS."
    },
    {
      "lang": "es",
      "value": "Los dispositivos DrayTek Vigor3910 hasta 4.3.2.6 permiten XSS reflejado basado en DOM no autenticado."
    }
  ],
  "id": "CVE-2024-41591",
  "lastModified": "2024-10-08T15:34:46.453",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-10-03T19:15:04.560",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mitigation",
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "https://www.forescout.com/resources/draybreak-draytek-research/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "https://www.forescout.com/resources/draytek14-vulnerabilities"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-03-03 22:15
Modified
2024-11-21 07:45
Summary
Certain Draytek products are vulnerable to Cross Site Scripting (XSS) via the wlogin.cgi script and user_login.cgi script of the router's web application management portal. This affects Vigor3910, Vigor1000B, Vigor2962 v4.3.2.1; Vigor2865 and Vigor2866 v4.4.1.0; Vigor2927 v4.4.2.2; and Vigor2915, Vigor2765, Vigor2766, Vigor2135 v4.4.2.0; Vigor2763 v4.4.2.1; Vigor2862 and Vigor2926 v3.9.9.0; Vigor2925 v3.9.3; Vigor2952 and Vigor3220 v3.9.7.3; Vigor2133 and Vigor2762 v3.9.6.4; and Vigor2832 v3.9.6.2.
Impacted products
Vendor Product Version
draytek vigor2860_firmware *
draytek vigor2860 -
draytek vigor2860n_firmware *
draytek vigor2860n -
draytek vigor2860n-plus_firmware *
draytek vigor2860n-plus -
draytek vigor2860vn-plus_firmware *
draytek vigor2860vn-plus -
draytek vigor2860ac_firmware *
draytek vigor2860ac -
draytek vigor2860vac_firmware *
draytek vigor2860vac -
draytek vigor2860l_firmware *
draytek vigor2860l -
draytek vigor2860ln_firmware *
draytek vigor2860ln -
draytek vigor2832_firmware *
draytek vigor2832 -
draytek vigor2832n_firmware *
draytek vigor2832n -
draytek vigor2766_firmware *
draytek vigor2766 -
draytek vigor2766ax_firmware *
draytek vigor2766ax -
draytek vigor2766ac_firmware *
draytek vigor2766ac -
draytek vigor2766vac_firmware *
draytek vigor2766vac -
draytek vigor2765_firmware *
draytek vigor2765 -
draytek vigor2765ax_firmware *
draytek vigor2765ax -
draytek vigor2765ac_firmware *
draytek vigor2765ac -
draytek vigor2765va_firmware *
draytek vigor2765va -
draytek vigor2763_firmware *
draytek vigor2763 -
draytek vigor2763ac_firmware *
draytek vigor2763ac -
draytek vigor2762_firmware *
draytek vigor2762 -
draytek vigor2762n_firmware *
draytek vigor2762n -
draytek vigor2762ac_firmware *
draytek vigor2762ac -
draytek vigor2762vac_firmware *
draytek vigor2762vac -
draytek vigor2135_firmware *
draytek vigor2135 -
draytek vigor2135ax_firmware *
draytek vigor2135ax -
draytek vigor2135ac_firmware *
draytek vigor2135ac -
draytek vigor2135vac_firmware *
draytek vigor2135vac -
draytek vigor2135fvac_firmware *
draytek vigor2135fvac -
draytek vigor2133_firmware *
draytek vigor2133 -
draytek vigor2133n_firmware *
draytek vigor2133n -
draytek vigor2133ac_firmware *
draytek vigor2133ac -
draytek vigor2133vac_firmware *
draytek vigor2133vac -
draytek vigor2133fvac_firmware *
draytek vigor2133fvac -
draytek vigor166_firmware *
draytek vigor166 -
draytek vigor165_firmware *
draytek vigor165 -
draytek vigor130_firmware *
draytek vigor130 -
draytek vigornic_132_firmware *
draytek vigornic_132 -
draytek virgor3910_firmware *
draytek virgor3910 -
draytek virgor3220_firmware *
draytek virgor3220 -
draytek virgor2962_firmware *
draytek virgor2962 -
draytek virgor2962p_firmware *
draytek virgor2962p -
draytek virgor1000b_firmware *
draytek virgor1000b -
draytek virgor2952_firmware *
draytek virgor2952 -
draytek virgor2952p_firmware *
draytek virgor2952p -
draytek virgor2927_firmware *
draytek virgor2927 -
draytek virgor2927ax_firmware *
draytek virgor2927ax -
draytek virgor2927ac_firmware *
draytek virgor2927ac -
draytek virgor2927vac_firmware *
draytek virgor2927vac -
draytek virgor2927f_firmware *
draytek virgor2927f -
draytek virgor2927l_firmware *
draytek virgor2927l -
draytek virgor2927lac_firmware *
draytek virgor2927lac -
draytek virgor2926_firmware *
draytek virgor2926 -
draytek virgor2926n_firmware *
draytek virgor2926n -
draytek virgor2926ac_firmware *
draytek virgor2926ac -
draytek virgor2926vac_firmware *
draytek virgor2926vac -
draytek virgor2926l_firmware *
draytek virgor2926l -
draytek virgor2926ln_firmware *
draytek virgor2926ln -
draytek virgor2926lac_firmware *
draytek virgor2926lac -
draytek virgor2925_firmware *
draytek virgor2925 -
draytek virgor2925n_firmware *
draytek virgor2925n -
draytek virgor2925n-plus_firmware *
draytek virgor2925n-plus -
draytek virgor2925vn-plus_firmware *
draytek virgor2925vn-plus -
draytek virgor2925ac_firmware *
draytek virgor2925ac -
draytek virgor2925vac_firmware *
draytek virgor2925vac -
draytek virgor2925fn_firmware *
draytek virgor2925fn -
draytek virgor2925l_firmware *
draytek virgor2925l -
draytek virgor2925ln_firmware *
draytek virgor2925ln -
draytek virgor2915_firmware *
draytek virgor2915 -
draytek virgor2915ac_firmware *
draytek virgor2915ac -
draytek virgor2866_firmware *
draytek virgor2866 -
draytek virgor2866ax_firmware *
draytek virgor2866ax -
draytek virgor2866ac_firmware *
draytek virgor2866ac -
draytek virgor2866vac_firmware *
draytek virgor2866vac -
draytek virgor2866l_firmware *
draytek virgor2866l -
draytek virgor2866lac_firmware *
draytek virgor2866lac -
draytek virgor2865_firmware *
draytek virgor2865 -
draytek virgor2865ax_firmware *
draytek virgor2865ax -
draytek virgor2865ac_firmware *
draytek virgor2865ac -
draytek virgor2865vac_firmware *
draytek virgor2865vac -
draytek virgor2865l_firmware *
draytek virgor2865l -
draytek virgor2865lac_firmware *
draytek virgor2865lac -
draytek virgor2862_firmware *
draytek virgor2862 -
draytek virgor2862n_firmware *
draytek virgor2862n -
draytek virgor2862ac_firmware *
draytek virgor2862ac -
draytek virgor2862vac_firmware *
draytek virgor2862vac -
draytek virgor2862b_firmware *
draytek virgor2862b -
draytek virgor2862bn_firmware *
draytek virgor2862bn -
draytek virgor2862l_firmware *
draytek virgor2862l -
draytek virgor2862ln_firmware *
draytek virgor2862ln -
draytek virgor2862lac_firmware *
draytek virgor2862lac -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C69AB3BE-7E50-4315-AB58-C33C49E8BB30",
              "versionEndExcluding": "3.9.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2860n_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "12F8DFDE-A5B0-44C2-ABAF-109058B56134",
              "versionEndExcluding": "3.9.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2860n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "499BAE46-109A-4BD5-BFBD-9EB8FD824196",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2860n-plus_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A0B678C-D666-4225-8756-727BFC699284",
              "versionEndExcluding": "3.9.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2860n-plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "896A175A-89F5-4120-A181-C300FE0C5DF8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2860vn-plus_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B7D5E6C-F079-422F-B18F-22E8D82D37F5",
              "versionEndExcluding": "3.9.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2860vn-plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFFB93AF-0BD9-499C-AC77-E5B78D2FF51C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2860ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "11C4E10B-0C86-4103-87C4-E9154014ECBD",
              "versionEndExcluding": "3.9.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2860ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BED772E6-7A3B-44DA-B0AE-6EDB09C646B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2860vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "594D3E56-7A7C-4A17-8BE9-DC08C6AB2662",
              "versionEndExcluding": "3.9.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2860vac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "997B7B3F-F81A-4644-BB79-8DC79E6ADD0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2860l_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90047D4-532C-4B75-BACC-CBCC77F82361",
              "versionEndExcluding": "3.9.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2860l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5437856D-50E6-497E-AE7E-15C3D8F2CD41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2860ln_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "178EE86C-DE2A-42EB-B27E-CC6615BB8618",
              "versionEndExcluding": "3.9.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2860ln:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DE2B9AA-B33E-4689-8765-56603FA3A5EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4E9EBB3-C5D0-41DC-93F4-9BBCE183A1B0",
              "versionEndExcluding": "3.9.6.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2832n_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E3C1158-B7E0-4B14-ACB8-11C9D080C6E1",
              "versionEndExcluding": "3.9.6.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2832n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B22E55C6-F71F-4EA7-B679-895A012B7020",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D205DD2E-3787-4345-BE2D-639E4576E4F2",
              "versionEndExcluding": "4.4.2.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2766ax_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1405F9A0-3D26-4412-8ADE-FBAD8215A860",
              "versionEndExcluding": "4.4.2.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2766ax:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3D0E87-A5A2-4828-A79D-DB10FE6BC4D2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2766ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B95391-36FA-43EB-BFB5-7F6E66FE2161",
              "versionEndExcluding": "4.4.2.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2766ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "787134FE-0549-427D-A9CE-32B1C58BC954",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2766vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "95026A20-EB1B-49F4-ADBE-7CD3094C9E92",
              "versionEndExcluding": "4.4.2.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2766vac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "228DC583-B6BC-4948-A167-53C49B6D04B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1FA8A23-F2A8-4EBE-ACEE-99C3879C8AC7",
              "versionEndExcluding": "4.4.2.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2765ax_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "849F90B6-C7AE-437E-8A47-56A64C43EBD9",
              "versionEndExcluding": "4.4.2.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2765ax:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F653097B-9197-43A9-A9B4-8AA6EAFC5666",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2765ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "60411E51-9FE5-415F-A5A7-B392B69AFD4C",
              "versionEndExcluding": "4.4.2.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2765ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1B9AF22-089B-41FB-8E30-BED3E4CE32ED",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2765va_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1DAF2A5-0129-42F3-9157-6D8CEA3B808F",
              "versionEndExcluding": "4.4.2.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2765va:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA2C3E48-B40E-4E2D-BA7E-111FA3CC5ADA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEA4A96F-598F-46F6-B634-E34683D72C34",
              "versionEndExcluding": "4.4.2.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EA9DF5D-6651-455A-9305-C42C0FF51F01",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2763ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDB9FADB-2C06-40C9-A895-C5396F9B3BC0",
              "versionEndExcluding": "4.4.2.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2763ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC9BF014-B8EA-4DD9-8320-627C3D276596",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "247A0B24-5A88-42A1-A54E-566530CE599A",
              "versionEndExcluding": "3.9.6.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2762n_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FE71C5B-EEE1-4903-96A2-47D2B318E6DA",
              "versionEndExcluding": "3.9.6.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2762n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47B532B5-386F-4C4C-8554-C73409124306",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2762ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5BC3CD7-1876-45FE-9BB2-37BE9CCC7D8C",
              "versionEndExcluding": "3.9.6.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2762ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CEA5BFB-5D2F-44B2-B995-0675243264CA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2762vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "125E3846-5419-474E-B6C7-D407239B43FD",
              "versionEndExcluding": "3.9.6.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2762vac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F97B07D-BC53-42A4-BBA3-D9CF5D474C9E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED11EF06-B83B-410C-A2D1-0841CF25F61F",
              "versionEndExcluding": "4.4.2.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2135ax_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4003BBE0-09BA-46D0-9683-3855E5F0AAD9",
              "versionEndExcluding": "4.4.2.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2135ax:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C37EA55-2526-4130-A57C-65950A5DFE57",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2135ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A16548F6-3D21-4875-B462-FDC5AF9A642A",
              "versionEndExcluding": "4.4.2.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2135ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77D227B7-1121-4657-A621-AF0C0E766D90",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2135vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "06507A17-10FC-42CF-A81B-DC5BA7575CFF",
              "versionEndExcluding": "4.4.2.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2135vac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAC1C9BE-31B5-47DD-BE09-0984EE29A957",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2135fvac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D86329F8-FF42-4477-BE57-A0B25AAB5FBB",
              "versionEndExcluding": "4.4.2.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2135fvac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625DE418-F506-4579-9C25-04DCD0FBC7ED",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "064DB573-532E-418B-BAED-78AA19B0CADA",
              "versionEndExcluding": "3.9.6.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2133n_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "27258517-C97A-4A9E-AD0A-D27E49E7C39F",
              "versionEndExcluding": "3.9.6.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2133n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3F57E3F-8FFB-4A48-8BFD-5245D1EF2B80",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2133ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F1039C4-B2E1-48E2-A177-372B6285C6D9",
              "versionEndExcluding": "3.9.6.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2133ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "196CE92C-805E-4B6A-8EA8-7A49515FB617",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2133vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5D3D2B2-8BD4-4654-A801-04E999CC28C8",
              "versionEndExcluding": "3.9.6.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2133vac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B81C46C-C837-4C10-AE7F-9E98A1A9E15C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2133fvac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A877CD3-16CA-4461-8D1B-A56E242B2B09",
              "versionEndExcluding": "3.9.6.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2133fvac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1999AE2-3E6E-4D18-8FF1-D2A853B5975F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1ADA571-2AA2-46FC-8B0D-74E44C4AE4CF",
              "versionEndExcluding": "4.2.4.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "84121576-0E77-4CFB-9C9B-3ABCA7CAC0B8",
              "versionEndExcluding": "4.2.4.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor130_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C20E7E09-4B2A-4134-B7AB-78EE38FB2001",
              "versionEndExcluding": "3.8.5.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor130:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7194998-2D96-43DE-85B6-35A8E474C695",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigornic_132_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6062FBA9-6034-44E2-BD4F-1F06BDD291B2",
              "versionEndExcluding": "3.8.5.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigornic_132:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B523DCD7-27FA-4376-BB96-A9C8CD39C4B1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor3910_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A5DB539-227A-4AAD-A853-D6A88ADAD510",
              "versionEndExcluding": "4.3.2.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor3910:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82F03C0D-CCD6-49DA-83DA-54C861551C17",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor3220_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "99B2A2D0-C7EB-4108-97A4-9D97C9EE63E7",
              "versionEndExcluding": "3.9.7.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor3220:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A5F144-CB45-472D-8E20-5A04471AD2F6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2962_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "40A252DC-0DC7-4F8A-8E3D-20F08D1CFC8C",
              "versionEndExcluding": "4.3.2.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2962:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F9D2786-6228-4AFC-835B-D64AB6116630",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2962p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C43C95A-752D-46C0-B79B-4F45D05C6F62",
              "versionEndExcluding": "4.3.2.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2962p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCDB3A87-7A61-4BB9-9D35-DF1588FFD21C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor1000b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF628882-657A-4417-9664-4A73975E0961",
              "versionEndExcluding": "4.3.2.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor1000b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5296C5E-0057-4504-8E18-56A0623F0A82",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2952_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5E8EBA6-1221-4FE7-84DE-DFA92E5C7FD0",
              "versionEndExcluding": "3.9.7.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2952:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53EDEDCA-1623-454D-972D-C44A01554702",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2952p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DC5397C-A77D-458A-B599-849283E665D4",
              "versionEndExcluding": "3.9.7.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2952p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A76B7DCB-87B3-48C6-92FE-8C85E7B27CB7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2927_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6E6E369-1A34-4289-89B6-E91E82AB9E46",
              "versionEndExcluding": "4.4.2.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2927:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC44B279-5873-43B7-81FE-74249229B099",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2927ax_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "65BDC4C4-8EDC-42E9-B271-14735F65C2B3",
              "versionEndExcluding": "4.4.2.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2927ax:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53101711-7D2A-4C3E-947F-390E266691C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2927ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2A696E5-AAF2-4191-B4FD-34CCCFD2A296",
              "versionEndExcluding": "4.4.2.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2927ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00807E08-CA52-4F54-9973-3040DB31B69B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2927vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53F4A065-081B-4C41-B908-B1E1AF183708",
              "versionEndExcluding": "4.4.2.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2927vac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B0639DA-FFC8-4836-9582-837E85C25D7B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2927f_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25E5D1FF-8265-4387-9F9A-E036EF35B8C2",
              "versionEndExcluding": "4.4.2.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2927f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E46C5FA7-B751-4567-B88D-2516F6601F26",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2927l_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9113CCB6-B005-4F8E-8A63-4253781B56B5",
              "versionEndExcluding": "4.4.2.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2927l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C180295-BD70-42B3-8F94-937E546DF684",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2927lac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A600B6-8382-4C31-B9E8-DB4D0AC64E64",
              "versionEndExcluding": "4.4.2.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2927lac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1905D290-A2CD-4E89-8871-E2B868A4706B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2926_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51AFB18-4BC7-4520-A946-512D32018A48",
              "versionEndExcluding": "3.9.9.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2926:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88E14F7-49FD-4C7C-A464-1472F83C02EB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2926n_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "355C3BC9-3E08-412C-9BF1-272BE1164B04",
              "versionEndExcluding": "3.9.9.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2926n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F710B59-2FD4-4248-AD49-E2AA2A55E60F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2926ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13DADABC-446E-40AD-8DB1-25677CEFCC40",
              "versionEndExcluding": "3.9.9.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2926ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CF45B8C-D9C5-4898-9672-01505598538D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2926vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "39423B29-38C5-4907-BAA7-D5F8E5CAD41A",
              "versionEndExcluding": "3.9.9.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2926vac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F096A7D2-5D76-4E6E-B008-4ADE281F76B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2926l_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1640446B-A0D7-4C84-9917-7C3729C1EC17",
              "versionEndExcluding": "3.9.9.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2926l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F652A445-B22C-4CF0-98A0-F28622FC5B18",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2926ln_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "18979C33-41FC-40FD-9647-180B46ACF28F",
              "versionEndExcluding": "3.9.9.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2926ln:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F12F1783-00AE-46AD-A5C6-684C9DC86685",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2926lac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34898CE3-AFB0-4473-8198-A28E5C2199B0",
              "versionEndExcluding": "3.9.9.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2926lac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "451679D5-B1A5-4985-A4FC-E2690B773BD1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2925_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A1F5282-0213-434F-B4FA-B26C0408CC12",
              "versionEndExcluding": "3.9.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2925:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEC6EF57-5F16-4D45-851C-E36E91FAD065",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2925n_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2672643C-495C-429F-80BC-6F1C52455A05",
              "versionEndExcluding": "3.9.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2925n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80CF03F7-AF76-4868-BCB7-AF1E113BAAFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2925n-plus_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0DFB22C-6888-417D-AD46-23CE9F902D97",
              "versionEndExcluding": "3.9.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2925n-plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3BC8600-C739-4E4B-8088-A8A7DCDD89B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2925vn-plus_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA20CC1D-476B-4901-B659-97326A02D6BD",
              "versionEndExcluding": "3.9.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2925vn-plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7720BC2-0677-4651-87F0-60477FDAE7CB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2925ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "26DEA194-4872-4C8C-9DBB-668841F729D2",
              "versionEndExcluding": "3.9.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2925ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8D94A36-58AB-482C-B246-DA0C4AB22845",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2925vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A88E3963-3A90-486E-AF8C-CC2FD1A4CB90",
              "versionEndExcluding": "3.9.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2925vac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B166193F-41B7-4233-857E-F2AF0A588F38",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2925fn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AB1D035-AF79-4823-95A5-FC3E24552327",
              "versionEndExcluding": "3.9.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2925fn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEEDB58-2691-4996-B0EE-B6A1B37F7B4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2925l_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A27F20A0-227B-4E13-87A5-FC3A58B3B4E6",
              "versionEndExcluding": "3.9.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2925l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE06F34D-6E06-4159-99D6-96A3EC4D9CA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2925ln_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BCFDDA8-DBC1-44D1-8B61-1F0CEAE8E28A",
              "versionEndExcluding": "3.9.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2925ln:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCF4FF06-20A1-48A5-B4C1-82CD988CFE0B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2915_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DD6F695-46C6-4370-92D4-D85F7889FFA0",
              "versionEndExcluding": "4.4.2.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2915:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C801847-E96C-4A5C-BB2A-D0F7412AF426",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2915ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F30B1859-3EDE-4807-90D0-4F08E10CE15A",
              "versionEndExcluding": "4.4.2.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2915ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CC39403-D69A-463A-BC36-01A346F39563",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2866_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3E4D76E-C5F3-47C1-9C02-73CAD9536C14",
              "versionEndExcluding": "4.4.1.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2866:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "916E22AD-6E90-4799-97C1-9B6076BF8692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2866ax_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC62E66F-46B0-413C-8563-561F4FE3C5F8",
              "versionEndExcluding": "4.4.1.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2866ax:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA51BF57-FE52-4050-AD5A-FE755FE8E304",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2866ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE07C9E-3CA2-494B-AE45-CAAD2CE7C61D",
              "versionEndExcluding": "4.4.1.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2866ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5CD2EEE-3586-49C6-97CC-A6C35F832A16",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2866vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A552DF1-0F67-47A3-962D-8C6691F51B85",
              "versionEndExcluding": "4.4.1.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2866vac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1716A531-93C4-44EA-BBF1-10AC412D70FA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2866l_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "754F101F-CD17-49FC-BB78-B2A25BA814A8",
              "versionEndExcluding": "4.4.1.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2866l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B5C20CF-9216-45B4-82EC-02D0C3890C7E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2866lac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FDF5FFF-C18D-4687-B67C-9474B1914B2B",
              "versionEndExcluding": "4.4.1.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2866lac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A121B16-E31F-4A8B-8B22-D1D29DF0CC08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2865_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F144A7E6-671C-4C42-867F-90019C497626",
              "versionEndExcluding": "4.4.1.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2865:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48FB2C00-1224-4089-90EC-096E9B6B7D59",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2865ax_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5E63877-6C2E-4DBF-A674-E85DA536C763",
              "versionEndExcluding": "4.4.1.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2865ax:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEB2B256-D66A-4FCB-9BCD-859207396597",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2865ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EFAF008-4AA1-487B-BECE-A6EB3217F541",
              "versionEndExcluding": "4.4.1.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2865ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F29220-4011-4E6A-9BD1-5D4BF2A6E30F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2865vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E460D9A5-52D2-4DC8-8D8A-B241AA8967C8",
              "versionEndExcluding": "4.4.1.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2865vac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A41FDE27-CF79-4D24-8750-5F3404D0F7DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2865l_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DEA3DED-9CA8-4DBD-8225-4BED2A8163E4",
              "versionEndExcluding": "4.4.1.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2865l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C7BEA7A-90E2-401E-90CA-531413DDB52E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2865lac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "453FC249-363F-4A07-BFFE-90FBE947DCD9",
              "versionEndExcluding": "4.4.1.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2865lac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9256371-2614-4EEC-A3D7-5F3BB640CE65",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2862_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "97F0BFDD-2741-4199-A7D1-B1D8207C4854",
              "versionEndExcluding": "3.9.9.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2862:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64FC405E-AE73-4BDE-8AD3-3C9A5114E09C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2862n_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "84D980BE-6B26-4253-9841-1CFBA2E8640B",
              "versionEndExcluding": "3.9.9.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2862n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99A79B15-EE49-49A9-B73D-2144BD1D0576",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2862ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "301DE6C8-72CE-4065-89DC-973C16DDBE5D",
              "versionEndExcluding": "3.9.9.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2862ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D7DA0D3-B58F-47C6-9129-405F343D7B6E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2862vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E484FF9C-AD68-4F82-8DC3-BBB660C6F0C9",
              "versionEndExcluding": "3.9.9.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2862vac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4625E2E-9266-4EAA-9A1A-CECE2F13621A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2862b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "917E51E4-5E83-47E3-BF92-E40F923F4B98",
              "versionEndExcluding": "3.9.9.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2862b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D69821B-8B5E-4524-8BD6-18F8C08C50E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2862bn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D460BD2D-F9C7-4D58-9542-AAAC1A414941",
              "versionEndExcluding": "3.9.9.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2862bn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B94EF99-BC59-4854-B2F1-40F9C95C6615",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2862l_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "98FA8473-6FF6-4D71-9862-464291C664E5",
              "versionEndExcluding": "3.9.9.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2862l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6D5FD5-10A9-4789-B9F9-B001F0EB6F73",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2862ln_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6468CE20-2725-410D-8BD2-37CEC1C7D5CF",
              "versionEndExcluding": "3.9.9.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2862ln:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6AB1EBB-3ACD-44D1-A161-7FE30151EC30",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:virgor2862lac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "733009ED-C49D-4C6E-AE9E-9C3257E442D9",
              "versionEndExcluding": "3.9.9.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:virgor2862lac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "659DCBC2-EF52-4EC5-BA5B-CD7E9D7B8221",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Certain Draytek products are vulnerable to Cross Site Scripting (XSS) via the wlogin.cgi script and user_login.cgi script of the router\u0027s web application management portal. This affects Vigor3910, Vigor1000B, Vigor2962 v4.3.2.1; Vigor2865 and Vigor2866 v4.4.1.0; Vigor2927 v4.4.2.2; and Vigor2915, Vigor2765, Vigor2766, Vigor2135 v4.4.2.0; Vigor2763 v4.4.2.1; Vigor2862 and Vigor2926 v3.9.9.0; Vigor2925 v3.9.3; Vigor2952 and Vigor3220 v3.9.7.3; Vigor2133 and Vigor2762 v3.9.6.4; and Vigor2832 v3.9.6.2."
    }
  ],
  "id": "CVE-2023-23313",
  "lastModified": "2024-11-21T07:45:58.963",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-03-03T22:15:09.690",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "https://www.draytek.com/about/security-advisory/cross-site-scripting-vulnerability-%28cve-2023-23313%29/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.horizonconsulting.com/advisories23-Multiple-XSS-Stored-in-DrayTek-routers-CVE-2023-23313"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.draytek.com/about/security-advisory/cross-site-scripting-vulnerability-%28cve-2023-23313%29/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.horizonconsulting.com/advisories23-Multiple-XSS-Stored-in-DrayTek-routers-CVE-2023-23313"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-10-03 19:15
Modified
2024-10-08 15:31
Summary
An issue in DrayTek Vigor310 devices through 4.3.2.6 allows an attacker to obtain sensitive information because the httpd server of the Vigor management UI uses a static string for seeding the PRNG of OpenSSL.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "289E3E0B-6BA4-44B8-968A-AC374B15B631",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D98663B-F2F5-4ADC-9FD5-75846890EEBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6E55BCE-BBF0-454B-AE86-45B7298888B3",
              "versionEndExcluding": "4.4.5.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5860CBE4-328E-418D-9E81-1D3AF7DB8F2B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89461FD4-897D-44F1-8486-4BCCDE3772DD",
              "versionEndExcluding": "4.4.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F87D851-15BC-4FC1-8AB7-D5C15B2B74F0",
              "versionEndExcluding": "4.4.5.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3D46DEC-06AB-489F-A0B5-10C31F80A8C1",
              "versionEndExcluding": "4.4.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B1826F9-0258-44DD-A471-113CF55CE563",
              "versionEndExcluding": "4.4.5.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A559F44-80F8-44B7-B70F-BA0B78C85283",
              "versionEndExcluding": "4.4.5.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EA9DF5D-6651-455A-9305-C42C0FF51F01",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4AB3320-27F8-4359-AEF8-6B1FDBA67111",
              "versionEndExcluding": "4.4.5.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "08B9436B-B2FE-4644-BB06-B0537EC23A71",
              "versionEndExcluding": "4.2.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDBC681E-CD03-49E5-BC3A-E4A7654975A3",
              "versionEndExcluding": "4.3.2.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABDC93B5-DC0A-4AA4-A340-382F108AE80B",
              "versionEndExcluding": "4.4.3.1",
              "versionStartIncluding": "4.4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FF86645-253A-4BA3-BA2A-2725575C390D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59521C99-00BA-4503-823E-3FEA44F8DDA0",
              "versionEndExcluding": "4.2.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B937F11C-FC86-4D6E-A46B-BA2CA0FFCEF7",
              "versionEndExcluding": "4.3.2.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2602941C-255F-4289-9043-D396CC4B3192",
              "versionEndExcluding": "4.4.3.1",
              "versionStartIncluding": "4.4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0549C870-BE10-441A-B07D-0701915E5A9E",
              "versionEndExcluding": "4.3.2.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D1A9825-E419-4740-996A-5928D207FCB6",
              "versionEndExcluding": "4.4.3.1",
              "versionStartIncluding": "4.4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "84670562-F228-40A0-A38D-144EA62556D3",
              "versionEndExcluding": "4.3.6.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "282E5318-DAA8-4AA2-8E7D-4B8BD9162153",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BD8E59-6C67-4C80-B25F-2C5814A8CF0E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "43265128-7E8E-4FE2-8488-AC5734A4AF70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52F71B18-89B5-42C7-B4B7-448844D6AFBC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A96F64C0-09DD-4553-AC5F-D722B8321B0D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C4077B-C73F-4431-9103-C09960E203E1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D081E5D-7A68-47A0-9EFE-1FC01DA2FF23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C470B04-BD57-429B-80FC-328A7D2E35E5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A688631-4B36-43CC-AEF8-D390081F01DC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E207BB52-29F8-4F2F-AA06-855B38E22958",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167336E2-AAA8-4424-AB07-2D7C9E1542B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8437FD-65E2-4203-82B9-8FC32444204A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64955940-3998-4B76-92D1-D9F3FAB874B4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue in DrayTek Vigor310 devices through 4.3.2.6 allows an attacker to obtain sensitive information because the httpd server of the Vigor management UI uses a static string for seeding the PRNG of OpenSSL."
    },
    {
      "lang": "es",
      "value": "Un problema en los dispositivos DrayTek Vigor310 hasta la versi\u00f3n 4.3.2.6 permite a un atacante obtener informaci\u00f3n confidencial porque el servidor httpd de la interfaz de administraci\u00f3n de Vigor utiliza una cadena est\u00e1tica para inicializar el PRNG de OpenSSL."
    }
  ],
  "id": "CVE-2024-41594",
  "lastModified": "2024-10-08T15:31:47.907",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-10-03T19:15:04.800",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mitigation",
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "https://www.forescout.com/resources/draybreak-draytek-research/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "https://www.forescout.com/resources/draytek14-vulnerabilities"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-326"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-10-03 19:15
Modified
2024-10-08 15:35
Severity ?
Summary
DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "84670562-F228-40A0-A38D-144EA62556D3",
              "versionEndExcluding": "4.3.6.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "282E5318-DAA8-4AA2-8E7D-4B8BD9162153",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0549C870-BE10-441A-B07D-0701915E5A9E",
              "versionEndExcluding": "4.3.2.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D1A9825-E419-4740-996A-5928D207FCB6",
              "versionEndExcluding": "4.4.3.1",
              "versionStartIncluding": "4.4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B937F11C-FC86-4D6E-A46B-BA2CA0FFCEF7",
              "versionEndExcluding": "4.3.2.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2602941C-255F-4289-9043-D396CC4B3192",
              "versionEndExcluding": "4.4.3.1",
              "versionStartIncluding": "4.4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59521C99-00BA-4503-823E-3FEA44F8DDA0",
              "versionEndExcluding": "4.2.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDBC681E-CD03-49E5-BC3A-E4A7654975A3",
              "versionEndExcluding": "4.3.2.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABDC93B5-DC0A-4AA4-A340-382F108AE80B",
              "versionEndExcluding": "4.4.3.1",
              "versionStartIncluding": "4.4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FF86645-253A-4BA3-BA2A-2725575C390D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "08B9436B-B2FE-4644-BB06-B0537EC23A71",
              "versionEndExcluding": "4.2.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4AB3320-27F8-4359-AEF8-6B1FDBA67111",
              "versionEndExcluding": "4.4.5.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A559F44-80F8-44B7-B70F-BA0B78C85283",
              "versionEndExcluding": "4.4.5.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EA9DF5D-6651-455A-9305-C42C0FF51F01",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B1826F9-0258-44DD-A471-113CF55CE563",
              "versionEndExcluding": "4.4.5.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3D46DEC-06AB-489F-A0B5-10C31F80A8C1",
              "versionEndExcluding": "4.4.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F87D851-15BC-4FC1-8AB7-D5C15B2B74F0",
              "versionEndExcluding": "4.4.5.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89461FD4-897D-44F1-8486-4BCCDE3772DD",
              "versionEndExcluding": "4.4.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6E55BCE-BBF0-454B-AE86-45B7298888B3",
              "versionEndExcluding": "4.4.5.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5860CBE4-328E-418D-9E81-1D3AF7DB8F2B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "289E3E0B-6BA4-44B8-968A-AC374B15B631",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D98663B-F2F5-4ADC-9FD5-75846890EEBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BD8E59-6C67-4C80-B25F-2C5814A8CF0E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "43265128-7E8E-4FE2-8488-AC5734A4AF70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52F71B18-89B5-42C7-B4B7-448844D6AFBC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A96F64C0-09DD-4553-AC5F-D722B8321B0D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C4077B-C73F-4431-9103-C09960E203E1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D081E5D-7A68-47A0-9EFE-1FC01DA2FF23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C470B04-BD57-429B-80FC-328A7D2E35E5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A688631-4B36-43CC-AEF8-D390081F01DC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E207BB52-29F8-4F2F-AA06-855B38E22958",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167336E2-AAA8-4424-AB07-2D7C9E1542B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8437FD-65E2-4203-82B9-8FC32444204A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64955940-3998-4B76-92D1-D9F3FAB874B4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow."
    },
    {
      "lang": "es",
      "value": "Los dispositivos DrayTek Vigor310 hasta 4.3.2.6 permiten a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n ft_payload_dns(), porque se produce una operaci\u00f3n de extensi\u00f3n de signo de byte para el argumento de longitud de una llamada _memcpy, lo que lleva a un desbordamiento de b\u00fafer basado en el mont\u00f3n."
    }
  ],
  "id": "CVE-2024-41593",
  "lastModified": "2024-10-08T15:35:04.583",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-10-03T19:15:04.740",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mitigation",
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "https://www.forescout.com/resources/draybreak-draytek-research/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "https://www.forescout.com/resources/draytek14-vulnerabilities"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-10-03 19:15
Modified
2024-10-08 15:32
Summary
Stored XSS, by authenticated users, is caused by poor sanitization of the Login Page Greeting message in DrayTek Vigor310 devices through 4.3.2.6.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B937F11C-FC86-4D6E-A46B-BA2CA0FFCEF7",
              "versionEndExcluding": "4.3.2.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2602941C-255F-4289-9043-D396CC4B3192",
              "versionEndExcluding": "4.4.3.1",
              "versionStartIncluding": "4.4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "84670562-F228-40A0-A38D-144EA62556D3",
              "versionEndExcluding": "4.3.6.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "282E5318-DAA8-4AA2-8E7D-4B8BD9162153",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0549C870-BE10-441A-B07D-0701915E5A9E",
              "versionEndExcluding": "4.3.2.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D1A9825-E419-4740-996A-5928D207FCB6",
              "versionEndExcluding": "4.4.3.1",
              "versionStartIncluding": "4.4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59521C99-00BA-4503-823E-3FEA44F8DDA0",
              "versionEndExcluding": "4.2.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDBC681E-CD03-49E5-BC3A-E4A7654975A3",
              "versionEndExcluding": "4.3.2.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABDC93B5-DC0A-4AA4-A340-382F108AE80B",
              "versionEndExcluding": "4.4.3.1",
              "versionStartIncluding": "4.4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FF86645-253A-4BA3-BA2A-2725575C390D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "08B9436B-B2FE-4644-BB06-B0537EC23A71",
              "versionEndExcluding": "4.2.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4AB3320-27F8-4359-AEF8-6B1FDBA67111",
              "versionEndExcluding": "4.4.5.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A559F44-80F8-44B7-B70F-BA0B78C85283",
              "versionEndExcluding": "4.4.5.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EA9DF5D-6651-455A-9305-C42C0FF51F01",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B1826F9-0258-44DD-A471-113CF55CE563",
              "versionEndExcluding": "4.4.5.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3D46DEC-06AB-489F-A0B5-10C31F80A8C1",
              "versionEndExcluding": "4.4.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F87D851-15BC-4FC1-8AB7-D5C15B2B74F0",
              "versionEndExcluding": "4.4.5.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89461FD4-897D-44F1-8486-4BCCDE3772DD",
              "versionEndExcluding": "4.4.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6E55BCE-BBF0-454B-AE86-45B7298888B3",
              "versionEndExcluding": "4.4.5.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5860CBE4-328E-418D-9E81-1D3AF7DB8F2B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "289E3E0B-6BA4-44B8-968A-AC374B15B631",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D98663B-F2F5-4ADC-9FD5-75846890EEBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BD8E59-6C67-4C80-B25F-2C5814A8CF0E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "43265128-7E8E-4FE2-8488-AC5734A4AF70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52F71B18-89B5-42C7-B4B7-448844D6AFBC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A96F64C0-09DD-4553-AC5F-D722B8321B0D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C4077B-C73F-4431-9103-C09960E203E1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D081E5D-7A68-47A0-9EFE-1FC01DA2FF23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C470B04-BD57-429B-80FC-328A7D2E35E5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A688631-4B36-43CC-AEF8-D390081F01DC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E207BB52-29F8-4F2F-AA06-855B38E22958",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167336E2-AAA8-4424-AB07-2D7C9E1542B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8437FD-65E2-4203-82B9-8FC32444204A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64955940-3998-4B76-92D1-D9F3FAB874B4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stored XSS, by authenticated users, is caused by poor sanitization of the Login Page Greeting message in DrayTek Vigor310 devices through 4.3.2.6."
    },
    {
      "lang": "es",
      "value": "El XSS almacenado, por parte de usuarios autenticados, es causado por una mala desinfecci\u00f3n del mensaje de saludo de la p\u00e1gina de inicio de sesi\u00f3n en los dispositivos DrayTek Vigor310 hasta 4.3.2.6."
    }
  ],
  "id": "CVE-2024-41587",
  "lastModified": "2024-10-08T15:32:18.313",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-10-03T19:15:04.310",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mitigation",
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "https://www.forescout.com/resources/draybreak-draytek-research/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "https://www.forescout.com/resources/draytek14-vulnerabilities"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2024-41593
Vulnerability from cvelistv5
Published
2024-10-03 00:00
Modified
2024-10-03 19:13
Severity ?
Summary
DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-41593",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-03T19:12:46.197818Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-03T19:13:02.836Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-03T18:29:21.947598",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.forescout.com/resources/draytek14-vulnerabilities"
        },
        {
          "url": "https://www.forescout.com/resources/draybreak-draytek-research/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2024-41593",
    "datePublished": "2024-10-03T00:00:00",
    "dateReserved": "2024-07-18T00:00:00",
    "dateUpdated": "2024-10-03T19:13:02.836Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-23313
Vulnerability from cvelistv5
Published
2023-03-03 00:00
Modified
2024-08-02 10:28
Severity ?
Summary
Certain Draytek products are vulnerable to Cross Site Scripting (XSS) via the wlogin.cgi script and user_login.cgi script of the router's web application management portal. This affects Vigor3910, Vigor1000B, Vigor2962 v4.3.2.1; Vigor2865 and Vigor2866 v4.4.1.0; Vigor2927 v4.4.2.2; and Vigor2915, Vigor2765, Vigor2766, Vigor2135 v4.4.2.0; Vigor2763 v4.4.2.1; Vigor2862 and Vigor2926 v3.9.9.0; Vigor2925 v3.9.3; Vigor2952 and Vigor3220 v3.9.7.3; Vigor2133 and Vigor2762 v3.9.6.4; and Vigor2832 v3.9.6.2.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T10:28:40.675Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.draytek.com/about/security-advisory/cross-site-scripting-vulnerability-%28cve-2023-23313%29/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.horizonconsulting.com/advisories23-Multiple-XSS-Stored-in-DrayTek-routers-CVE-2023-23313"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Certain Draytek products are vulnerable to Cross Site Scripting (XSS) via the wlogin.cgi script and user_login.cgi script of the router\u0027s web application management portal. This affects Vigor3910, Vigor1000B, Vigor2962 v4.3.2.1; Vigor2865 and Vigor2866 v4.4.1.0; Vigor2927 v4.4.2.2; and Vigor2915, Vigor2765, Vigor2766, Vigor2135 v4.4.2.0; Vigor2763 v4.4.2.1; Vigor2862 and Vigor2926 v3.9.9.0; Vigor2925 v3.9.3; Vigor2952 and Vigor3220 v3.9.7.3; Vigor2133 and Vigor2762 v3.9.6.4; and Vigor2832 v3.9.6.2."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-19T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.draytek.com/about/security-advisory/cross-site-scripting-vulnerability-%28cve-2023-23313%29/"
        },
        {
          "url": "https://www.horizonconsulting.com/advisories23-Multiple-XSS-Stored-in-DrayTek-routers-CVE-2023-23313"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-23313",
    "datePublished": "2023-03-03T00:00:00",
    "dateReserved": "2023-01-11T00:00:00",
    "dateUpdated": "2024-08-02T10:28:40.675Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-41591
Vulnerability from cvelistv5
Published
2024-10-03 00:00
Modified
2024-10-03 19:14
Severity ?
Summary
DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-41591",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-03T19:14:46.529762Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-03T19:14:57.400Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-03T18:26:22.678110",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.forescout.com/resources/draytek14-vulnerabilities"
        },
        {
          "url": "https://www.forescout.com/resources/draybreak-draytek-research/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2024-41591",
    "datePublished": "2024-10-03T00:00:00",
    "dateReserved": "2024-07-18T00:00:00",
    "dateUpdated": "2024-10-03T19:14:57.400Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-41587
Vulnerability from cvelistv5
Published
2024-10-03 00:00
Modified
2024-10-03 20:25
Severity ?
Summary
Stored XSS, by authenticated users, is caused by poor sanitization of the Login Page Greeting message in DrayTek Vigor310 devices through 4.3.2.6.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-41587",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-03T20:24:15.931214Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-03T20:25:36.415Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Stored XSS, by authenticated users, is caused by poor sanitization of the Login Page Greeting message in DrayTek Vigor310 devices through 4.3.2.6."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-03T18:25:02.832324",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.forescout.com/resources/draytek14-vulnerabilities"
        },
        {
          "url": "https://www.forescout.com/resources/draybreak-draytek-research/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2024-41587",
    "datePublished": "2024-10-03T00:00:00",
    "dateReserved": "2024-07-18T00:00:00",
    "dateUpdated": "2024-10-03T20:25:36.415Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-41594
Vulnerability from cvelistv5
Published
2024-10-03 00:00
Modified
2024-10-03 19:09
Severity ?
Summary
An issue in DrayTek Vigor310 devices through 4.3.2.6 allows an attacker to obtain sensitive information because the httpd server of the Vigor management UI uses a static string for seeding the PRNG of OpenSSL.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-41594",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-03T19:09:26.192252Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-03T19:09:40.490Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue in DrayTek Vigor310 devices through 4.3.2.6 allows an attacker to obtain sensitive information because the httpd server of the Vigor management UI uses a static string for seeding the PRNG of OpenSSL."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-03T18:29:39.340103",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.forescout.com/resources/draytek14-vulnerabilities"
        },
        {
          "url": "https://www.forescout.com/resources/draybreak-draytek-research/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2024-41594",
    "datePublished": "2024-10-03T00:00:00",
    "dateReserved": "2024-07-18T00:00:00",
    "dateUpdated": "2024-10-03T19:09:40.490Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}