CVE-2020-8515

CRITICAL KEV NUCLEI

DrayTek - RCE

Title source: llm

Description

DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI. This issue has been fixed in Vigor3900/2960/300B v1.5.1.

Exploits (4)

exploitdb WORKING POC
by 0xsha · goremotelinux
https://www.exploit-db.com/exploits/48268
nomisec WORKING POC 14 stars
by imjdl · remote
https://github.com/imjdl/CVE-2020-8515-PoC
nomisec WORKING POC 3 stars
by darrenmartyn · remote
https://github.com/darrenmartyn/CVE-2020-8515
nomisec SCANNER 2 stars
by truerandom · remote
https://github.com/truerandom/nmap_draytek_rce

Nuclei Templates (1)

DrayTek - Remote Code Execution
CRITICALby pikpikcu

Scores

CVSS v3 9.8
EPSS 0.9436
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2021-11-03
VulnCheck KEV 2020-04-03
InTheWild.io 2020-03-27
ENISA EUVD EUVD-2020-29381
CWE
CWE-78
Status published
Products (5)
draytek/vigor2960_firmware 1.3.1 beta
draytek/vigor300b_firmware 1.3.3 beta
draytek/vigor300b_firmware 1.4.2.1 beta
draytek/vigor300b_firmware 1.4.4 beta
draytek/vigor3900_firmware 1.4.4 beta
Published Feb 01, 2020
KEV Added Nov 03, 2021
Tracked Since Feb 18, 2026