Description

DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow.

INFO

Published Date :

2024-10-03T00:00:00.000Z

Last Modified :

2025-03-13T18:11:33.093Z

Source :

mitre
AFFECTED PRODUCTS

The following products are affected by CVE-2024-41593 vulnerability.

Vendors Products
Draytek
  • Vigor1000b
  • Vigor1000b Firmware
  • Vigor165
  • Vigor165 Firmware
  • Vigor166
  • Vigor166 Firmware
  • Vigor2133
  • Vigor2133 Firmware
  • Vigor2135
  • Vigor2135 Firmware
  • Vigor2620
  • Vigor2620 Firmware
  • Vigor2762
  • Vigor2762 Firmware
  • Vigor2763
  • Vigor2763 Firmware
  • Vigor2765
  • Vigor2765 Firmware
  • Vigor2766
  • Vigor2766 Firmware
  • Vigor2832
  • Vigor2832 Firmware
  • Vigor2860
  • Vigor2860 Firmware
  • Vigor2862
  • Vigor2862 Firmware
  • Vigor2865
  • Vigor2865 Firmware
  • Vigor2866
  • Vigor2866 Firmware
  • Vigor2915
  • Vigor2915 Firmware
  • Vigor2925
  • Vigor2925 Firmware
  • Vigor2926
  • Vigor2926 Firmware
  • Vigor2952
  • Vigor2952 Firmware
  • Vigor2962
  • Vigor2962 Firmware
  • Vigor3220
  • Vigor3220 Firmware
  • Vigor3910
  • Vigor3910 Firmware
  • Vigor3912
  • Vigor3912 Firmware
  • Vigorlte200
  • Vigorlte200 Firmware
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-41593.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact