DrayTek.VigorConnect.DownloadFileServlet.Path.Traversal
Description
This indicates an attack attempt to exploit a Path Traversal vulnerability in Draytek VigorConnect.
The vulnerability is due to insufficient validation when handling user-supplied inputs. A remote, unauthenticated attacker could exploit this vulnerability by sending a maliciously crafted request to the target server. Successful exploitation can lead to the disclosure of sensitive information.
Affected Products
Draytek VigorConnect v1.6.0-B3
Impact
Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.
Recommended Actions
Apply patch, available from the website.
https://www.draytek.com/about/security-advisory/vigorconnect-software-security-vulnerability-(cve-2021-20123-cve-2021-20129)
Coverage
| IPS (Regular DB) | |
| IPS (Extended DB) |