Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-12987 β€” AI Deep Analysis Summary

CVSS 7.3 Β· High

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Critical OS Command Injection in DrayTek routers.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-78 (OS Command Injection). πŸ› **Flaw**: The `session` parameter in the `/cgi-bin/mainfunction.cgi/apmcfgupload` endpoint is not sanitized, allowing malicious input to be executed by the OS.

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: DrayTek (ε±…ζ˜“η§‘ζŠ€). πŸ“¦ **Affected Products**: Vigor300B (Load Balancer Router) & Vigor2960 (Router). πŸ“… **Version**: Specifically v1.5.1.4.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Privileges**: Likely Root/System level due to command injection. πŸ“‚ **Data**: Full access to router configuration, logs, and potentially connected network data. 🌐 **Impact**: Complete control over the gateway device.

Q5Is exploitation threshold high? (Auth/Config)

⚠️ **Threshold**: LOW. πŸšͺ **Auth**: No authentication required (PR:N). 🌍 **Access**: Network accessible (AV:N). πŸ–±οΈ **UI**: No user interaction needed (UI:N). This is a high-risk, easy-to-exploit flaw.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Exploit Status**: YES. πŸ“œ **PoC Available**: Public Nuclei template exists on GitHub (projectdiscovery). 🌐 **Wild Exploitation**: High risk due to low barrier to entry and available automation tools.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for the specific endpoint `/cgi-bin/mainfunction.cgi/apmcfgupload`. πŸ§ͺ **Test**: Use Nuclei with the provided CVE-2024-12987 template.…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fix**: Update firmware immediately. πŸ“‰ **Mitigation**: If update is impossible, restrict web management access to trusted IPs only via firewall rules.…

Q9What if no patch? (Workaround)

🚧 **Workaround**: Block external access to port 80/443 for the web management interface. 🚫 **Disable**: If not needed, disable the web management interface entirely.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: CRITICAL. 🚨 **Urgency**: IMMEDIATE ACTION REQUIRED. With CVSS L/AC:L/PR:N, this is an easy target for automated botnets. Patch or isolate NOW.