إرسال #757126: DrayTek Vigor 300B v1.5.1.6 OS Command Injectionالمعلومات

عنوانDrayTek Vigor 300B v1.5.1.6 OS Command Injection
الوصفA serious command injection vulnerability was discovered in the Web management interface of the DrayTek Vigor device. This vulnerability is located in the /cgi-bin/mainfunction.cgi/uploadlangs route that handles language package uploads. The application obtains the file information through cgiGetFile. In the sub_1157C function, the system extracts the file name and attempts to move it to the specified directory. Due to improper handling of the file name parameter, an injection risk was caused:
المصدر⚠️ https://github.com/master-abc/cve/issues/42
المستخدم
 jiefengliang (UID 93721)
ارسال12/02/2026 08:51 AM (2 أشهر منذ)
الاعتدال23/02/2026 05:34 PM (11 days later)
الحالةتمت الموافقة
إدخال VulDB347394 [DrayTek Vigor 300B حتى 1.5.1.6 Web Management Interface uploadlangs cgiGetFile ملف تجاوز الصلاحيات]
النقاط20

Interested in the pricing of exploits?

See the underground prices here!