A vulnerability was found in Draytek Vigor 3910 4.3.2.6. It has been classified as critical. This affects an unknown part of the file v2x00.cgi. The manipulation of the argument sDnsPro leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2024-46591. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability was found in Draytek Vigor 3910 4.3.2.6 and classified as critical. Affected by this issue is some unknown functionality of the file wizfw.cgi. The manipulation of the argument sProfileName leads to buffer overflow.
This vulnerability is handled as CVE-2024-46588. The attack needs to be done within the local network. There is no exploit available.
A vulnerability has been found in Draytek Vigor 3910 4.3.2.6 and classified as critical. Affected by this vulnerability is an unknown functionality of the file v2x00.cgi. The manipulation of the argument saveVPNProfile leads to buffer overflow.
This vulnerability is known as CVE-2024-46594. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability, which was classified as critical, was found in Draytek Vigor 3910 4.3.2.6. Affected is an unknown function of the file cgiswm.cgi. The manipulation of the argument trapcomm leads to buffer overflow.
This vulnerability is traded as CVE-2024-46593. The attack can only be done within the local network. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Draytek Vigor 3910 4.3.2.6. This issue affects some unknown processing of the file v2x00.cgi. The manipulation of the argument ssidencrypt_5g%d leads to buffer overflow.
The identification of this vulnerability is CVE-2024-46592. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability classified as critical was found in Draytek Vigor 3910 4.3.2.6. This vulnerability affects unknown code of the file v2x00.cgi. The manipulation of the argument ssidencrypt%d leads to buffer overflow.
This vulnerability was named CVE-2024-46590. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability classified as critical has been found in Draytek Vigor 3910 4.3.2.6. This affects an unknown part of the file inetipv6.cgi. The manipulation of the argument sIpv6AiccuUser leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2024-46589. Access to the local network is required for this attack. There is no exploit available.
A vulnerability was found in Draytek Vigor 3910 4.3.2.6. It has been rated as critical. Affected by this issue is some unknown functionality of the file v2x00.cgi. The manipulation of the argument sCloudPass leads to buffer overflow.
This vulnerability is handled as CVE-2024-46586. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability was found in Draytek Vigor 3910 4.3.2.6. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file usergrp.cgi. The manipulation of the argument sProfileName leads to buffer overflow.
This vulnerability is known as CVE-2024-46585. The attack needs to be done within the local network. There is no exploit available.
A vulnerability was found in Draytek Vigor 3910 4.3.2.6. It has been classified as critical. Affected is an unknown function of the file acontrol.cgi. The manipulation of the argument AControlIp1 leads to buffer overflow.
This vulnerability is traded as CVE-2024-46584. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability was found in Draytek Vigor 3910 4.3.2.6 and classified as critical. This issue affects some unknown processing of the file cgiapp.cgi. The manipulation of the argument extRadSrv2 leads to buffer overflow.
The identification of this vulnerability is CVE-2024-46583. The attack can only be done within the local network. There is no exploit available.
A vulnerability has been found in Draytek Vigor 3910 4.3.2.6 and classified as critical. This vulnerability affects unknown code of the file v2x00.cgi. The manipulation of the argument sSrvAddr leads to buffer overflow.
This vulnerability was named CVE-2024-46582. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability, which was classified as critical, was found in Draytek Vigor 3910 4.3.2.6. This affects an unknown part of the file v2x00.cgi. The manipulation of the argument sProfName leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2024-46581. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Draytek Vigor 3910 4.3.2.6. Affected by this issue is some unknown functionality of the file v2x00.cgi. The manipulation of the argument fid leads to buffer overflow.
This vulnerability is handled as CVE-2024-46580. Access to the local network is required for this attack. There is no exploit available.
A vulnerability classified as critical was found in Draytek Vigor 3910 4.3.2.6. Affected by this vulnerability is an unknown functionality of the file fwuser.cgi. The manipulation of the argument sPPPSrvNm leads to buffer overflow.
This vulnerability is known as CVE-2024-46571. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability classified as critical has been found in Draytek Vigor 3910 4.3.2.6. Affected is an unknown function of the file vpn.cgi. The manipulation of the argument sPeerId leads to buffer overflow.
This vulnerability is traded as CVE-2024-46568. The attack needs to be done within the local network. There is no exploit available.
A vulnerability was found in Draytek Vigor 3910 4.3.2.6. It has been rated as critical. This issue affects some unknown processing of the file v2x00.cgi. The manipulation of the argument iProfileIdx leads to buffer overflow.
The identification of this vulnerability is CVE-2024-46567. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability was found in Draytek Vigor 3910 4.3.2.6. It has been declared as critical. This vulnerability affects unknown code of the file sslapp.cgi. The manipulation of the argument sAppName leads to buffer overflow.
This vulnerability was named CVE-2024-46566. The attack can only be done within the local network. There is no exploit available.
A vulnerability was found in Draytek Vigor 3910 4.3.2.6. It has been classified as critical. This affects an unknown part of the file service.cgi. The manipulation of the argument sSrvName leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2024-46565. The attack needs to be approached within the local network. There is no exploit available.