Draytek Vigor Series (Multiple Devices) - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CVE-2020-8515)
Description
DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi
URI.
Threat Landscape & Known Exploitation
This vulnerability was reported by GreyNoise to have been exploited 'in the wild' during March 2025.
NOTE: The FBI, CNMF, NSA, NCSC and other national cybersecurity agencies have as of September 2024 issued a joint cybersecurity alert regarding the compromise of up to 260,000 Internet-connected devices in a campaign by Chinese (PRC)-linked cyber actors. The threat actors used a network of compromised nodes (a “botnet”) as a proxy to conceal their identities while deploying distributed denial of service (DDoS) attacks or compromising targeted networks in the West. The botnet uses a customized variant of the 'Mirai' family of malware as a component of a system that automates the hijack of devices including SOHO routers, firewalls and NAS devices. Compromise of the device is achieved via the exploit of over 60 known and catalogued vulnerabilities, of which this CVE is one. Full details are available via the published NSA report.
Remediation
This issue has been fixed in Vigor3900/2960/300B v1.5.1. Update to the latest version.
Risk
Versions
Information
- Category
- Command Injection
- CWE
- CWE-78
- CVE
- Known Exploitation Activity
OWASP
- OWASP 2013
- A1 - Injection
- OWASP 2017
- A1 - Injection
- OWASP 2021
- A3 - Injection