cve/2023/CVE-2023-1009.md

19 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-1009](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1009)
![](https://img.shields.io/static/v1?label=Product&message=Vigor%202960&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.5.1.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Path%20Traversal&color=brighgreen)
### Description
** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical has been found in DrayTek Vigor 2960 1.5.1.4/1.5.1.5. Affected is the function sub_1DF14 of the file /cgi-bin/mainfunction.cgi of the component Web Management Interface. The manipulation of the argument option with the input /../etc/passwd- leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-221742 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
### POC
#### Reference
- https://github.com/xxy1126/Vuln/blob/main/Draytek/1.md
2024-06-09 00:33:16 +00:00
- https://github.com/xxy1126/Vuln/blob/main/Draytek/1.md
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.