A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.
References
| Link | Resource |
|---|---|
| https://netsecfish.notion.site/Command-Injection-in-apmcfgupload-endpoint-for-DrayTek-Gateway-Devices-1676b683e67c8040b7f1f0ffe29ce18f?pvs=4 | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.289380 | Permissions Required VDB Entry |
| https://vuldb.com/?id.289380 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.468795 | Third Party Advisory VDB Entry |
| https://fw.draytek.com.tw/Vigor2960/Firmware/v1.5.1.5/DrayTek_Vigor2960_V1.5.1.5_01release-note.pdf | Release Notes |
| https://fw.draytek.com.tw/Vigor300B/Firmware/v1.5.1.5/DrayTek_Vigor300B_V1.5.1.5_01release-note.pdf | Release Notes |
| https://fw.draytek.com.tw/Vigor3900/Firmware/v1.5.1.5/DrayTek_Vigor3900_V1.5.1.5_01release-note.pdf | Not Applicable |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-12987 | US Government Resource |
Configurations
History
30 Oct 2025, 19:53
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-12987 - US Government Resource |
21 Oct 2025, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:19
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:20
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
16 May 2025, 18:43
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://netsecfish.notion.site/Command-Injection-in-apmcfgupload-endpoint-for-DrayTek-Gateway-Devices-1676b683e67c8040b7f1f0ffe29ce18f?pvs=4 - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.289380 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.289380 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.468795 - Third Party Advisory, VDB Entry | |
| References | () https://fw.draytek.com.tw/Vigor2960/Firmware/v1.5.1.5/DrayTek_Vigor2960_V1.5.1.5_01release-note.pdf - Release Notes | |
| References | () https://fw.draytek.com.tw/Vigor300B/Firmware/v1.5.1.5/DrayTek_Vigor300B_V1.5.1.5_01release-note.pdf - Release Notes | |
| References | () https://fw.draytek.com.tw/Vigor3900/Firmware/v1.5.1.5/DrayTek_Vigor3900_V1.5.1.5_01release-note.pdf - Not Applicable | |
| First Time |
Draytek vigor300b Firmware
Draytek vigor2960 Draytek vigor2960 Firmware Draytek Draytek vigor300b |
|
| CPE | cpe:2.3:o:draytek:vigor300b_firmware:1.5.1.4:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:* cpe:2.3:h:draytek:vigor300b:-:*:*:*:*:*:*:* cpe:2.3:o:draytek:vigor2960_firmware:1.5.1.4:*:*:*:*:*:*:* |
15 May 2025, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
14 May 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References |
|
27 Dec 2024, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-12-27 16:15
Updated : 2025-10-30 19:53
NVD link : CVE-2024-12987
Mitre link : CVE-2024-12987
CVE.ORG link : CVE-2024-12987
JSON object : View
Products Affected
draytek
- vigor300b_firmware
- vigor2960
- vigor300b
- vigor2960_firmware
