#VU106349 Stack-based buffer overflow in DrayTek Corp. products - CVE-2024-51138

 

#VU106349 Stack-based buffer overflow in DrayTek Corp. products - CVE-2024-51138

Published: April 1, 2025


Vulnerability identifier: #VU106349
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2024-51138
CWE-ID: CWE-121
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Vigor2620 LTE
VigorLTE 200n
Vigor2133
Vigor2135
Vigor2762
Vigor2765
Vigor2766
Vigor2832
Vigor2860
Vigor2860 LTE
Vigor2862
Vigor2862 LTE
Vigor2865
Vigor2865 LTE
Vigor2865L-5G
Vigor2866
Vigor2866 LTE
Vigor2915
Vigor2925
Vigor2925 LTE
Vigor2926
Vigor2926 LTE
Vigor2927
Vigor2927 LTE
Vigor2927L-5G
Vigor2952
Vigor2952P
Vigor2962
Vigor3220
Vigor3910
Vigor3912
Software vendor:
DrayTek Corp.

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the URL parsing functionality of the TR069 STUN server. A remote unauthenticated attacker can send a specially crafted request, trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links