Soumettre #757126: DrayTek Vigor 300B v1.5.1.6 OS Command Injectioninformation

TitreDrayTek Vigor 300B v1.5.1.6 OS Command Injection
DescriptionA serious command injection vulnerability was discovered in the Web management interface of the DrayTek Vigor device. This vulnerability is located in the /cgi-bin/mainfunction.cgi/uploadlangs route that handles language package uploads. The application obtains the file information through cgiGetFile. In the sub_1157C function, the system extracts the file name and attempts to move it to the specified directory. Due to improper handling of the file name parameter, an injection risk was caused:
La source⚠️ https://github.com/master-abc/cve/issues/42
Utilisateur
 jiefengliang (UID 93721)
Soumission12/02/2026 08:51 (il y a 2 mois)
Modérer23/02/2026 17:34 (11 days later)
StatutAccepté
Entrée VulDB347394 [DrayTek Vigor 300B jusqu’à 1.5.1.6 Web Management Interface uploadlangs cgiGetFile Fichier élévation de privilèges]
Points20

Want to know what is going to be exploited?

We predict KEV entries!