Product:

Vigor3910_firmware

(Draytek)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 42
Date Id Summary Products Score Patch Annotated
2024-09-18 CVE-2024-46592 Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the ssidencrypt_5g%d parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. Vigor3910_firmware 7.5
2024-09-18 CVE-2024-46591 Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sDnsPro parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. Vigor3910_firmware 7.5
2024-09-18 CVE-2024-46593 Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the trapcomm parameter at cgiswm.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. Vigor3910_firmware 7.5
2024-09-18 CVE-2024-46595 Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the saveitem parameter at lan2lan.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. Vigor3910_firmware 7.5
2024-09-18 CVE-2024-46594 Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the saveVPNProfile parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. Vigor3910_firmware 7.5
2024-09-18 CVE-2024-46596 Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sAct parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. Vigor3910_firmware 7.5
2024-09-18 CVE-2024-46597 Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sPubKey parameter at dialin.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. Vigor3910_firmware 7.5
2024-09-18 CVE-2024-46598 Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the iprofileidx parameter at dialin.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. Vigor3910_firmware 7.5
2023-06-01 CVE-2023-33778 Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website. Myvigor, Vigor1000b_firmware, Vigor130_firmware, Vigor165_firmware, Vigor166_firmware, Vigor167_firmware, Vigor2135ac_firmware, Vigor2135ax_firmware, Vigor2135fvac_firmware, Vigor2135vac_firmware, Vigor2620l_firmware, Vigor2620ln_firmware, Vigor2763ac_firmware, Vigor2765ac_firmware, Vigor2765ax_firmware, Vigor2765vac_firmware, Vigor2766ac_firmware, Vigor2766ax_firmware, Vigor2766vac_firmware, Vigor2832n_firmware, Vigor2862ac_firmware, Vigor2862b_firmware, Vigor2862bn_firmware, Vigor2862l_firmware, Vigor2862lac_firmware, Vigor2862ln_firmware, Vigor2862n_firmware, Vigor2862vac_firmware, Vigor2865ac_firmware, Vigor2865ax_firmware, Vigor2865l_firmware, Vigor2865lac_firmware, Vigor2865vac_firmware, Vigor2866ac_firmware, Vigor2866ax_firmware, Vigor2866l_firmware, Vigor2866lac_firmware, Vigor2866vac_firmware, Vigor2915ac_firmware, Vigor2926_plus_firmware, Vigor2927ac_firmware, Vigor2927ax_firmware, Vigor2927f_firmware, Vigor2927l_firmware, Vigor2927lac_firmware, Vigor2927vac_firmware, Vigor2962_firmware, Vigor3910_firmware, Vigorap_1000c_firmware, Vigorap_1060c_firmware, Vigorap_903_firmware, Vigorap_906_firmware, Vigorap_912c_firmware, Vigorap_918r_firmware, Vigorap_960c_firmware, Vigorlte_200n_firmware, Vigorswitch_fx2120_firmware, Vigorswitch_g1080_firmware, Vigorswitch_g1085_firmware, Vigorswitch_g1282_firmware, Vigorswitch_g2100_firmware, Vigorswitch_g2121_firmware, Vigorswitch_g2280x_firmware, Vigorswitch_g2540xs_firmware, Vigorswitch_p1282_firmware, Vigorswitch_p2100_firmware, Vigorswitch_p2280x_firmware, Vigorswitch_p2540xs_firmware, Vigorswitch_pq2121x_firmware, Vigorswitch_pq2200xb_firmware, Vigorswitch_q2121x_firmware, Vigorswitch_q2200x_firmware 9.8
2022-08-29 CVE-2022-32548 An issue was discovered on certain DrayTek Vigor routers before July 2022 such as the Vigor3910 before 4.3.1.1. /cgi-bin/wlogin.cgi has a buffer overflow via the username or password to the aa or ab field. Vigor1000b_firmware, Vigor165_firmware, Vigor166_firmware, Vigor2133_firmware, Vigor2133ac_firmware, Vigor2133fvac_firmware, Vigor2133n_firmware, Vigor2133vac_firmware, Vigor2135_firmware, Vigor2135ac_firmware, Vigor2135fvac_firmware, Vigor2135vac_firmware, Vigor2620l_firmware, Vigor2620ln_firmware, Vigor2762_firmware, Vigor2762ac_firmware, Vigor2762n_firmware, Vigor2762vac_firmware, Vigor2765_firmware, Vigor2765ac_firmware, Vigor2765vac_firmware, Vigor2766_firmware, Vigor2766ac_firmware, Vigor2766vac_firmware, Vigor2832_firmware, Vigor2862_firmware, Vigor2862ac_firmware, Vigor2862b_firmware, Vigor2862bn_firmware, Vigor2862l_firmware, Vigor2862lac_firmware, Vigor2862ln_firmware, Vigor2862n_firmware, Vigor2862vac_firmware, Vigor2865_firmware, Vigor2865ac_firmware, Vigor2865ax_firmware, Vigor2865l_firmware, Vigor2865lac_firmware, Vigor2865vac_firmware, Vigor2866_firmware, Vigor2866ac_firmware, Vigor2866ax_firmware, Vigor2866l_firmware, Vigor2866lac_firmware, Vigor2866vac_firmware, Vigor2915_firmware, Vigor2915ac_firmware, Vigor2926_firmware, Vigor2926ac_firmware, Vigor2926l_firmware, Vigor2926lac_firmware, Vigor2926ln_firmware, Vigor2926n_firmware, Vigor2926vac_firmware, Vigor2927_firmware, Vigor2927ac_firmware, Vigor2927ax_firmware, Vigor2927l_firmware, Vigor2927lac_firmware, Vigor2927vac_firmware, Vigor2952_firmware, Vigor2952p_firmware, Vigor2962_firmware, Vigor2962p_firmware, Vigor3220_firmware, Vigor3910_firmware, Vigorlte_200n_firmware 9.8