Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 10 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Draytek vigor3900
|
|
| CPEs | cpe:2.3:h:draytek:vigor3900:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Draytek vigor3900
|
Mon, 04 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Draytek
Draytek vigor3900 Firmware |
|
| Weaknesses | CWE-78 | |
| CPEs | cpe:2.3:o:draytek:vigor3900_firmware:1.5.1.3:*:*:*:*:*:*:* | |
| Vendors & Products |
Draytek
Draytek vigor3900 Firmware |
|
| Metrics |
cvssV3_1
|
Mon, 04 Nov 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `doOpenVPN.` | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-04T17:01:25.323Z
Reserved: 2024-09-11T00:00:00.000Z
Link: CVE-2024-45887
Updated: 2024-11-04T16:51:04.060Z
Status : Analyzed
Published: 2024-11-04T15:15:22.123
Modified: 2025-04-10T15:52:38.610
Link: CVE-2024-45887
No data.
OpenCVE Enrichment
No data.