Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 10 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Draytek vigor3900
|
|
| CPEs | cpe:2.3:h:draytek:vigor3900:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Draytek vigor3900
|
Wed, 30 Oct 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Draytek
Draytek vigor3900 Firmware |
|
| Weaknesses | CWE-77 | |
| CPEs | cpe:2.3:o:draytek:vigor3900_firmware:1.5.1.3:*:*:*:*:*:*:* | |
| Vendors & Products |
Draytek
Draytek vigor3900 Firmware |
|
| Metrics |
cvssV3_1
|
Wed, 30 Oct 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doSSLTunnel function. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-30T17:35:03.692Z
Reserved: 2024-10-28T00:00:00.000Z
Link: CVE-2024-51258
Updated: 2024-10-30T17:34:55.528Z
Status : Analyzed
Published: 2024-10-30T17:15:14.037
Modified: 2025-04-10T15:51:21.347
Link: CVE-2024-51258
No data.
OpenCVE Enrichment
No data.