Buffer Overflow vulnerability in Vigor2620/LTE200 3.9.8.9 and earlier and Vigor2860/2925 3.9.8 and earlier and Vigor2862/2926 3.9.9.5 and earlier and Vigor2133/2762/2832 3.9.9 and earlier and Vigor165/166 4.2.7 and earlier and Vigor2135/2765/2766 4.4.5.1 and earlier and Vigor2865/2866/2927 4.4.5.3 and earlier and Vigor2962/3910 4.3.2.8/4.4.3.1 and earlier and Vigor3912 4.3.6.1 and earlier allows a remote attacker to execute arbitrary code via the CGI parser's handling of the "Content-Length" header of HTTP POST requests.

Project Subscriptions

Vendors Products
Draytek Subscribe
Vigor1000b Subscribe
Vigor1000b Firmware Subscribe
Vigor2133 Subscribe
Vigor2133 Firmware Subscribe
Vigor2135 Subscribe
Vigor2135 Firmware Subscribe
Vigor2620 Subscribe
Vigor2620 Firmware Subscribe
Vigor2762 Subscribe
Vigor2762 Firmware Subscribe
Vigor2763 Subscribe
Vigor2763 Firmware Subscribe
Vigor2765 Subscribe
Vigor2765 Firmware Subscribe
Vigor2766 Subscribe
Vigor2766 Firmware Subscribe
Vigor2832 Subscribe
Vigor2832 Firmware Subscribe
Vigor2860 Subscribe
Vigor2860 Firmware Subscribe
Vigor2862 Subscribe
Vigor2862 Firmware Subscribe
Vigor2865 Subscribe
Vigor2865 Firmware Subscribe
Vigor2866 Subscribe
Vigor2866 Firmware Subscribe
Vigor2915 Subscribe
Vigor2915 Firmware Subscribe
Vigor2925 Subscribe
Vigor2925 Firmware Subscribe
Vigor2926 Subscribe
Vigor2926 Firmware Subscribe
Vigor2927 Subscribe
Vigor2927 Firmware Subscribe
Vigor2952 Subscribe
Vigor2952 Firmware Subscribe
Vigor2962 Subscribe
Vigor2962 Firmware Subscribe
Vigor3220 Subscribe
Vigor3220 Firmware Subscribe
Vigor3910 Subscribe
Vigor3910 Firmware Subscribe
Vigor3912 Subscribe
Vigor3912 Firmware Subscribe
Vigorlte200 Subscribe
Vigorlte200 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2025-5949 Buffer Overflow vulnerability in Vigor2620/LTE200 3.9.8.9 and earlier and Vigor2860/2925 3.9.8 and earlier and Vigor2862/2926 3.9.9.5 and earlier and Vigor2133/2762/2832 3.9.9 and earlier and Vigor165/166 4.2.7 and earlier and Vigor2135/2765/2766 4.4.5.1 and earlier and Vigor2865/2866/2927 4.4.5.3 and earlier and Vigor2962/3910 4.3.2.8/4.4.3.1 and earlier and Vigor3912 4.3.6.1 and earlier allows a remote attacker to execute arbitrary code via the CGI parser's handling of the "Content-Length" header of HTTP POST requests.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 28 May 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Draytek
Draytek vigor1000b
Draytek vigor1000b Firmware
Draytek vigor2133
Draytek vigor2133 Firmware
Draytek vigor2135
Draytek vigor2135 Firmware
Draytek vigor2620
Draytek vigor2620 Firmware
Draytek vigor2762
Draytek vigor2762 Firmware
Draytek vigor2763
Draytek vigor2763 Firmware
Draytek vigor2765
Draytek vigor2765 Firmware
Draytek vigor2766
Draytek vigor2766 Firmware
Draytek vigor2832
Draytek vigor2832 Firmware
Draytek vigor2860
Draytek vigor2860 Firmware
Draytek vigor2862
Draytek vigor2862 Firmware
Draytek vigor2865
Draytek vigor2865 Firmware
Draytek vigor2866
Draytek vigor2866 Firmware
Draytek vigor2915
Draytek vigor2915 Firmware
Draytek vigor2925
Draytek vigor2925 Firmware
Draytek vigor2926
Draytek vigor2926 Firmware
Draytek vigor2927
Draytek vigor2927 Firmware
Draytek vigor2952
Draytek vigor2952 Firmware
Draytek vigor2962
Draytek vigor2962 Firmware
Draytek vigor3220
Draytek vigor3220 Firmware
Draytek vigor3910
Draytek vigor3910 Firmware
Draytek vigor3912
Draytek vigor3912 Firmware
Draytek vigorlte200
Draytek vigorlte200 Firmware
CPEs cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2927:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2927_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*
Vendors & Products Draytek
Draytek vigor1000b
Draytek vigor1000b Firmware
Draytek vigor2133
Draytek vigor2133 Firmware
Draytek vigor2135
Draytek vigor2135 Firmware
Draytek vigor2620
Draytek vigor2620 Firmware
Draytek vigor2762
Draytek vigor2762 Firmware
Draytek vigor2763
Draytek vigor2763 Firmware
Draytek vigor2765
Draytek vigor2765 Firmware
Draytek vigor2766
Draytek vigor2766 Firmware
Draytek vigor2832
Draytek vigor2832 Firmware
Draytek vigor2860
Draytek vigor2860 Firmware
Draytek vigor2862
Draytek vigor2862 Firmware
Draytek vigor2865
Draytek vigor2865 Firmware
Draytek vigor2866
Draytek vigor2866 Firmware
Draytek vigor2915
Draytek vigor2915 Firmware
Draytek vigor2925
Draytek vigor2925 Firmware
Draytek vigor2926
Draytek vigor2926 Firmware
Draytek vigor2927
Draytek vigor2927 Firmware
Draytek vigor2952
Draytek vigor2952 Firmware
Draytek vigor2962
Draytek vigor2962 Firmware
Draytek vigor3220
Draytek vigor3220 Firmware
Draytek vigor3910
Draytek vigor3910 Firmware
Draytek vigor3912
Draytek vigor3912 Firmware
Draytek vigorlte200
Draytek vigorlte200 Firmware

Tue, 04 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 28 Feb 2025 18:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 27 Feb 2025 21:00:00 +0000

Type Values Removed Values Added
Description Buffer Overflow vulnerability in Vigor2620/LTE200 3.9.8.9 and earlier and Vigor2860/2925 3.9.8 and earlier and Vigor2862/2926 3.9.9.5 and earlier and Vigor2133/2762/2832 3.9.9 and earlier and Vigor165/166 4.2.7 and earlier and Vigor2135/2765/2766 4.4.5.1 and earlier and Vigor2865/2866/2927 4.4.5.3 and earlier and Vigor2962/3910 4.3.2.8/4.4.3.1 and earlier and Vigor3912 4.3.6.1 and earlier allows a remote attacker to execute arbitrary code via the CGI parser's handling of the "Content-Length" header of HTTP POST requests.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-02-28T17:23:14.780Z

Reserved: 2024-10-28T00:00:00.000Z

Link: CVE-2024-51139

cve-icon Vulnrichment

Updated: 2025-02-28T17:23:11.150Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-27T21:15:37.123

Modified: 2025-05-28T16:23:26.310

Link: CVE-2024-51139

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses