Armis Logo< Back

CVE-2024-12987:

A critical OS command injection vulnerability in DrayTek Vigor2960 and Vigor300B Web Management Interface (apmcfgupload) can be exploited remotely by manipulating the session parameter; upgrading to firmware version 1.5.1.5 is recommended to remediate.


Score
Info
A numerical rating that indicates how dangerous this vulnerability is.

9.8Critical
  • Published Date:Dec 27, 2024
  • CISA KEV Date:May 15, 2025
  • Industries Affected:20
Armis Early Warning:
Early Warning139 Days

Threat Predictions

  • EPSS Score:79.5
  • EPSS Percentile:99%

Exploitability

  • Score:3.9
  • Attack Vector:NETWORK
  • Attack Complexity:LOW
  • Privileges Required:NONE
  • User Interaction:NONE
  • Scope:UNCHANGED

Impact

  • Score:5.9
  • Confidentiality Impact:HIGH
  • Integrity Impact:HIGH
  • Availability Impact:HIGH

Description Preview

A critical OS command injection vulnerability in DrayTek Vigor2960 and Vigor300B Web Management Interface (apmcfgupload) can be exploited remotely by manipulating the session parameter; upgrading to firmware version 1.5.1.5 is recommended to remediate.

Overview

DrayTek Vigor2960 and Vigor300B devices with the Web Management Interface are affected by an OS command injection vulnerability in the apmcfgupload function of /cgi-bin/mainfunction.cgi. The attacker can remotely manipulate a session parameter to run arbitrary commands on the device, potentially compromising control of the device itself. The issue has public exploit visibility and is addressed in firmware 1.5.1.5. Severity metrics vary across CVSS versions but align with a high-impact remote code execution risk, and upgrading to the fixed release is strongly recommended.

Remediation

  • Upgrade affected devices (Vigor2960 and Vigor300B) to firmware version 1.5.1.5 or later from the vendor.
  • If upgrading is not immediately possible, implement compensating controls:
  • Restrict web management exposure to trusted networks only (prefer VPN access; disable public Internet access to the management interface).
  • Place devices behind a firewall with strict access rules and monitor for unauthorized access attempts.
  • Enforce strong authentication and monitor management logs for suspicious activity.
  • After upgrade, verify the firmware version and perform basic functionality checks; monitor for any anomalous behavior and review release notes for confirmation of the fix.

References

Early WarningArmis Early Warning

Armis Early Warning provides proactive threat intelligence and early detection capabilities.Click here to learn more.

  • Armis Alert Date:Jan 7, 2025
  • CISA KEV Date:May 15, 2025
  • Days Early:139 Days

Industries Affected

Below is a list of industries most commonly impacted or potentially at risk based on intelligence.

Low
Mining icon
Mining
Utilities icon
Utilities
Information icon
Information
Construction icon
Construction
Retail Trade icon
Retail Trade
Manufacturing icon
Manufacturing
Wholesale Trade icon
Wholesale Trade
Educational Services icon
Educational Services
Finance and Insurance icon
Finance and Insurance
Public Administration icon
Public Administration
Real Estate Rental and Leasing icon
Real Estate Rental and Leasing
Transportation and Warehousing icon
Transportation and Warehousing
Accommodation and Food Services icon
Accommodation and Food Services
Health Care and Social Assistance icon
Health Care and Social Assistance
Arts, Entertainment, and Recreation icon
Arts, Entertainment, and Recreation
Management of Companies and Enterprises icon
Management of Companies and Enterprises
Agriculture, Forestry, Fishing and Hunting icon
Agriculture, Forestry, Fishing and Hunting
Other Services (except Public Administration) icon
Other Services (except Public Administration)
Professional, Scientific, and Technical Services icon
Professional, Scientific, and Technical Services
Administrative and Support and Waste Management and Remediation Services icon
Administrative and Support and Waste Management and Remediation Services

Focus on What Matters

See everything.Identify true risk.Proactively mitigate threats.Book a Demo

Let's talk!