CVE-2021-20123

A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the DownloadFileServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.
References
Link Resource
https://www.tenable.com/security/research/tra-2021-42 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:draytek:vigorconnect:1.6.0:beta3:*:*:*:*:*:*

History

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-668 CWE-22

19 Oct 2021, 16:35

Type Values Removed Values Added
CWE CWE-668
CVSS v2 : unknown
v3 : unknown
v2 : 7.8
v3 : 7.5
CPE cpe:2.3:a:draytek:vigorconnect:1.6.0:beta3:*:*:*:*:*:*
References (MISC) https://www.tenable.com/security/research/tra-2021-42 - (MISC) https://www.tenable.com/security/research/tra-2021-42 - Exploit, Third Party Advisory

13 Oct 2021, 17:37

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-13 16:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-20123

Mitre link : CVE-2021-20123

CVE.ORG link : CVE-2021-20123


JSON object : View

Products Affected

draytek

  • vigorconnect
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')