Critical Vulnerabilities in DrayTek Vigor2960/3900/300B Networking Products

Published on 29 Mar 2020

Updated on 06 Apr 2020

DrayTek has issued a security advisory on two zero-day vulnerabilities found in the WebUI feature of its Vigor2960/3900/300B networking products.
Remote code execution vulnerabilities exist in the cgi-bin/mainfunction.cgi and the corresponding Web Server programme, /usr/sbin/lighttpd. By sending a specially crafted request, an attacker could exploit it to execute arbitrary code on the device.
There have been reports of targeted attacks exploiting these vulnerabilities, which could allow attackers to eavesdrop on network traffic, run rogue SSH services on high ports and create persistent backdoor on the devices.
Affected owners and System Administrators are advised to apply the available patch (1.5.1 firmware or later) immediately.
More information is available at:

https://blog.netlab.360.com/two-zero-days-are-targeting-draytek-broadband-cpe-devices-en/