CVE-2024-41589

DrayTek Vigor310 devices through 4.3.2.6 use unencrypted HTTP for authentication requests.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*

History

10 Apr 2025, 13:43

Type Values Removed Values Added
References () https://www.forescout.com/resources/draybreak-draytek-research/ - () https://www.forescout.com/resources/draybreak-draytek-research/ - Third Party Advisory
References () https://www.forescout.com/resources/draytek14-vulnerabilities - () https://www.forescout.com/resources/draytek14-vulnerabilities - Broken Link
First Time Draytek
Draytek vigor3910 Firmware
Draytek vigor3910
CPE cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*
cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*

04 Oct 2024, 13:50

Type Values Removed Values Added
Summary
  • (es) Los dispositivos DrayTek Vigor310 hasta la versión 4.3.2.6 utilizan HTTP sin cifrar para solicitudes de autenticación.

03 Oct 2024, 21:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-287

03 Oct 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-03 19:15

Updated : 2025-04-10 13:43


NVD link : CVE-2024-41589

Mitre link : CVE-2024-41589

CVE.ORG link : CVE-2024-41589


JSON object : View

Products Affected

draytek

  • vigor3910
  • vigor3910_firmware
CWE
CWE-287

Improper Authentication