CVE-2020-8515
Summary
| CVE | CVE-2020-8515 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-02-01 13:15:00 UTC |
| Updated | 2023-11-07 03:26:00 UTC |
| Description | DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI. This issue has been fixed in Vigor3900/2960/300B v1.5.1. |
Risk And Classification
EPSS: 0.943570000 probability, percentile 0.999610000 (date 2026-04-02)
CISA KEV: Listed on 2021-11-03; due 2022-05-03; ransomware use Unknown
Problem Types: CWE-78
CISA Known Exploited Vulnerability
| Vendor | DrayTek |
|---|---|
| Product | Multiple Vigor Routers |
| Name | Multiple DrayTek Vigor Routers Web Management Page Vulnerability |
| Required Action | Apply updates per vendor instructions. |
| Notes | https://nvd.nist.gov/vuln/detail/CVE-2020-8515 |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Draytek | Vigor2960 | - | All | All | All |
| Hardware | Draytek | Vigor2960 | - | All | All | All |
| Operating System | Draytek | Vigor2960 Firmware | 1.3.1 | beta | All | All |
| Operating System | Draytek | Vigor2960 Firmware | 1.3.1 | beta | All | All |
| Hardware | Draytek | Vigor300b | - | All | All | All |
| Hardware | Draytek | Vigor300b | - | All | All | All |
| Operating System | Draytek | Vigor300b Firmware | 1.3.3 | beta | All | All |
| Operating System | Draytek | Vigor300b Firmware | 1.4.2.1 | beta | All | All |
| Operating System | Draytek | Vigor300b Firmware | 1.4.4 | beta | All | All |
| Operating System | Draytek | Vigor300b Firmware | 1.3.3 | beta | All | All |
| Operating System | Draytek | Vigor300b Firmware | 1.4.2.1 | beta | All | All |
| Operating System | Draytek | Vigor300b Firmware | 1.4.4 | beta | All | All |
| Hardware | Draytek | Vigor3900 | - | All | All | All |
| Hardware | Draytek | Vigor3900 | - | All | All | All |
| Operating System | Draytek | Vigor3900 Firmware | 1.4.4 | beta | All | All |
| Operating System | Draytek | Vigor3900 Firmware | 1.4.4 | beta | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| DrayTek Vigor2960 / Vigor3900 / Vigor300B Remote Command Execution ≈ Packet Storm | MISC | packetstormsecurity.com | |
| Vigor3900 / Vigor2960 / Vigor300B Router Web Management Page Vulnerability (CVE-2020-8515) | DrayTek | MISC | www.draytek.com | Exploit, Vendor Advisory |
| Vigor3900 / Vigor2960 / Vigor300B Router Web Management Page Vulnerability (CVE-2020-8515) | DrayTek | www.draytek.com | ||
| Blogger | MISC | sku11army.blogspot.com | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
| CISA Known Exploited Vulnerabilities catalog | CISA | www.cisa.gov | kev |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.