DrayTek.VigorConnect.DownloadFileServlet.Path.Traversal

description-logoDescription

This indicates an attack attempt to exploit a Path Traversal vulnerability in Draytek VigorConnect.
The vulnerability is due to insufficient validation when handling user-supplied inputs. A remote, unauthenticated attacker could exploit this vulnerability by sending a maliciously crafted request to the target server. Successful exploitation can lead to the disclosure of sensitive information.

affected-products-logoAffected Products

Draytek VigorConnect v1.6.0-B3

Impact logoImpact

Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Status Detail
2024-07-31 28.836
Modified
Default_action:pass:drop
2024-07-04 28.821
New