Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sat, 17 May 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Draytek vigor2960
|
|
| CPEs | cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor2960_firmware:1.4.4:*:*:*:*:*:*:* |
|
| Vendors & Products |
Draytek vigor2960
|
Fri, 08 Nov 2024 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 29 Oct 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Draytek
Draytek vigor2960 Firmware |
|
| Weaknesses | CWE-78 | |
| CPEs | cpe:2.3:o:draytek:vigor2960_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Draytek
Draytek vigor2960 Firmware |
|
| Metrics |
cvssV3_1
|
Mon, 28 Oct 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authorized RCE vulnerability exists in the DrayTek Vigor2960 router version 1.4.4, where an attacker can place a malicious command into the table parameter of the doPPPoE function in the cgi-bin/mainfunction.cgi route, and finally the command is executed by the system function. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-08T21:08:35.165Z
Reserved: 2024-10-08T00:00:00.000Z
Link: CVE-2024-48074
Updated: 2024-10-29T18:44:27.784Z
Status : Analyzed
Published: 2024-10-28T12:15:15.200
Modified: 2025-05-17T02:14:47.187
Link: CVE-2024-48074
No data.
OpenCVE Enrichment
No data.