CVE-2020-8515
CRITICAL KEV NUCLEIDrayTek - RCE
Title source: llmDescription
DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI. This issue has been fixed in Vigor3900/2960/300B v1.5.1.
Exploits (4)
Nuclei Templates (1)
DrayTek - Remote Code Execution
CRITICALby pikpikcu
References (4)
Scores
CVSS v3
9.8
EPSS
0.9436
EPSS Percentile
100.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2021-11-03
VulnCheck KEV
2020-04-03
InTheWild.io
2020-03-27
ENISA EUVD
EUVD-2020-29381
CWE
CWE-78
Status
published
Products (5)
draytek/vigor2960_firmware
1.3.1 beta
draytek/vigor300b_firmware
1.3.3 beta
draytek/vigor300b_firmware
1.4.2.1 beta
draytek/vigor300b_firmware
1.4.4 beta
draytek/vigor3900_firmware
1.4.4 beta
Published
Feb 01, 2020
KEV Added
Nov 03, 2021
Tracked Since
Feb 18, 2026