Description
DrayTek Vigor 2960 firmware versions prior to 1.5.1.4 contain an OS command injection vulnerability in the CGI login handler that allows unauthenticated remote attackers to execute arbitrary commands by injecting shell metacharacters into the formpassword parameter. Attackers can exploit unsanitized input passed to the otp_check.sh script to achieve remote code execution with web server privileges. Exploitation requires knowledge of a valid username and that the target account has MOTP authentication enabled.
Problem types
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Product status
Any version before 1.5.1.4
References
www.draytek.co.uk/...nd&id=2597:readme-v2960-1514&catid=1251
www.draytek.com/...1/2021/end-of-life-notification-vigor2960
www.vulncheck.com/...-command-injection-via-mainfunction-cgi