25 lines
1.1 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-51139",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-27T21:15:37.123",
"lastModified": "2025-02-27T21:15:37.123",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in Vigor2620/LTE200 3.9.8.9 and earlier and Vigor2860/2925 3.9.8 and earlier and Vigor2862/2926 3.9.9.5 and earlier and Vigor2133/2762/2832 3.9.9 and earlier and Vigor165/166 4.2.7 and earlier and Vigor2135/2765/2766 4.4.5.1 and earlier and Vigor2865/2866/2927 4.4.5.3 and earlier and Vigor2962/3910 4.3.2.8/4.4.3.1 and earlier and Vigor3912 4.3.6.1 and earlier allows a remote attacker to execute arbitrary code via the CGI parser's handling of the \"Content-Length\" header of HTTP POST requests."
}
],
"metrics": {},
"references": [
{
"url": "http://draytek.com",
"source": "cve@mitre.org"
},
{
"url": "https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946",
"source": "cve@mitre.org"
}
]
}