Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-45323 | In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doGRETunnel function. |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 10 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Draytek vigor3900 Firmware
|
|
| CPEs | cpe:2.3:o:draytek:vigor3900_firmware:1.5.1.3:*:*:*:*:*:*:* | |
| Vendors & Products |
Draytek vigor3900 Firmware
|
Wed, 19 Mar 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 |
Wed, 30 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Draytek
Draytek vigor3900 |
|
| CPEs | cpe:2.3:h:draytek:vigor3900:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Draytek
Draytek vigor3900 |
|
| Metrics |
cvssV3_1
|
Wed, 30 Oct 2024 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doGRETunnel function. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-19T20:47:20.953Z
Reserved: 2024-10-28T00:00:00.000Z
Link: CVE-2024-51298
Updated: 2024-10-30T15:25:36.571Z
Status : Analyzed
Published: 2024-10-30T14:15:08.430
Modified: 2025-04-10T15:51:45.313
Link: CVE-2024-51298
No data.
OpenCVE Enrichment
No data.
EUVD