Description

Vigor165/166 4.2.7 and earlier; Vigor2620/LTE200 3.9.8.9 and earlier; Vigor2860/2925 3.9.8 and earlier; Vigor2862/2926 3.9.9.5 and earlier; Vigor2133/2762/2832 3.9.9 and earlier; Vigor2135/2765/2766 4.4.5. and earlier; Vigor2865/2866/2927 4.4.5.3 and earlier; Vigor2962 4.3.2.8 and earlier; Vigor3912 4.3.6.1 and earlier; Vigor3910 4.4.3.1 and earlier a stack-based buffer overflow vulnerability has been identified in the URL parsing functionality of the TR069 STUN server. This flaw occurs due to insufficient bounds checking on the amount of URL parameters, allowing an attacker to exploit the overflow by sending a maliciously crafted request. Consequently, a remote attacker can execute arbitrary code with elevated privileges.

INFO

Published Date :

2025-02-27T00:00:00.000Z

Last Modified :

2025-02-28T21:31:37.139Z

Source :

mitre
AFFECTED PRODUCTS

The following products are affected by CVE-2024-51138 vulnerability.

Vendors Products
Draytek
  • Vigor1000b
  • Vigor1000b Firmware
  • Vigor2133
  • Vigor2133 Firmware
  • Vigor2135
  • Vigor2135 Firmware
  • Vigor2620
  • Vigor2620 Firmware
  • Vigor2762
  • Vigor2762 Firmware
  • Vigor2763
  • Vigor2763 Firmware
  • Vigor2765
  • Vigor2765 Firmware
  • Vigor2766
  • Vigor2766 Firmware
  • Vigor2832
  • Vigor2832 Firmware
  • Vigor2860
  • Vigor2860 Firmware
  • Vigor2862
  • Vigor2862 Firmware
  • Vigor2865
  • Vigor2865 Firmware
  • Vigor2866
  • Vigor2866 Firmware
  • Vigor2915
  • Vigor2915 Firmware
  • Vigor2925
  • Vigor2925 Firmware
  • Vigor2926
  • Vigor2926 Firmware
  • Vigor2927
  • Vigor2927 Firmware
  • Vigor2952
  • Vigor2952 Firmware
  • Vigor2962
  • Vigor2962 Firmware
  • Vigor3220
  • Vigor3220 Firmware
  • Vigor3910
  • Vigor3910 Firmware
  • Vigor3912
  • Vigor3912 Firmware
  • Vigorlte200
  • Vigorlte200 Firmware
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-51138.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact