Draytek Vigor Series (Multiple Devices) - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CVE-2020-8515)

Description

DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI.

Threat Landscape & Known Exploitation

This vulnerability was reported by GreyNoise to have been exploited 'in the wild' during March 2025.

NOTE: The FBI, CNMF, NSA, NCSC and other national cybersecurity agencies have as of September 2024 issued a joint cybersecurity alert regarding the compromise of up to 260,000 Internet-connected devices in a campaign by Chinese (PRC)-linked cyber actors. The threat actors used a network of compromised nodes (a “botnet”) as a proxy to conceal their identities while deploying distributed denial of service (DDoS) attacks or compromising targeted networks in the West. The botnet uses a customized variant of the 'Mirai' family of malware as a component of a system that automates the hijack of devices including SOHO routers, firewalls and NAS devices. Compromise of the device is achieved via the exploit of over 60 known and catalogued vulnerabilities, of which this CVE is one. Full details are available via the published NSA report.

Remediation

This issue has been fixed in Vigor3900/2960/300B v1.5.1. Update to the latest version.

Risk

Impact
Critical
Probability
Critical
CVSS v4 Score
CVSS v3 Score
9.8 / 10
CVSS v2 Score
10 / 10
EPSS
94.4 %

Versions

Information

Category
Command Injection
CWE
  • CWE-78
Known Exploitation Activity

OWASP

OWASP 2013
A1 - Injection
OWASP 2017
A1 - Injection
OWASP 2021
A3 - Injection