CVE-2020-8515

DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as...

Basic Information

CVE State
PUBLISHED
Reserved Date
February 01, 2020
Published Date
February 01, 2020
Last Updated
February 04, 2025
Vendor
n/a
Product
n/a
Description
DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI. This issue has been fixed in Vigor3900/2960/300B v1.5.1.

CVSS Scores

SSVC Information

Exploitation
active
Automatable
Yes
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (added 2021-11-03 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2021-09-01 22:47:54 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2021-11-03 00:00:00 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

darrenmartyn/CVE-2020-8515

Type: github • Created: 2021-09-01 22:47:54 UTC • Stars: 2

Draytek CVE-2020-8515 PoC

imjdl/CVE-2020-8515-PoC

Type: github • Created: 2020-03-30 03:31:26 UTC • Stars: 14

CVE-2020-8515-PoC