제출 #757126: DrayTek Vigor 300B v1.5.1.6 OS Command Injection정보

제목DrayTek Vigor 300B v1.5.1.6 OS Command Injection
설명A serious command injection vulnerability was discovered in the Web management interface of the DrayTek Vigor device. This vulnerability is located in the /cgi-bin/mainfunction.cgi/uploadlangs route that handles language package uploads. The application obtains the file information through cgiGetFile. In the sub_1157C function, the system extracts the file name and attempts to move it to the specified directory. Due to improper handling of the file name parameter, an injection risk was caused:
원천⚠️ https://github.com/master-abc/cve/issues/42
사용자
 jiefengliang (UID 93721)
제출2026. 02. 12. AM 08:51 (2 개월 ago)
모더레이션2026. 02. 23. PM 05:34 (11 days later)
상태수락
VulDB 항목347394 [DrayTek Vigor 300B 까지 1.5.1.6 Web Management Interface uploadlangs cgiGetFile 파일 권한 상승]
포인트들20

Want to know what is going to be exploited?

We predict KEV entries!