Home

Description

DrayTek Vigor 2960 firmware versions prior to 1.5.1.4 contain an OS command injection vulnerability in the CGI login handler that allows unauthenticated remote attackers to execute arbitrary commands by injecting shell metacharacters into the formpassword parameter. Attackers can exploit unsanitized input passed to the otp_check.sh script to achieve remote code execution with web server privileges. Exploitation requires knowledge of a valid username and that the target account has MOTP authentication enabled.

PUBLISHED Reserved 2026-04-29 | Published 2026-05-08 | Updated 2026-05-08 | Assigner VulnCheck




CRITICAL: 9.2CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

HIGH: 8.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
affected

Any version before 1.5.1.4
affected

References

www.draytek.co.uk/...nd&id=2597:readme-v2960-1514&catid=1251 release-notes patch

www.draytek.com/...1/2021/end-of-life-notification-vigor2960 vendor-advisory

www.vulncheck.com/...-command-injection-via-mainfunction-cgi third-party-advisory

cve.org (CVE-2022-50994)

nvd.nist.gov (CVE-2022-50994)

Download JSON