INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global phishing Multiple sectors HIGH 32m Global insider Cybersecurity Services CRITICAL 41m Global ransomware Multiple sectors (U.S. companies) CRITICAL 55m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 32m Global insider Cybersecurity Services CRITICAL 41m Global ransomware Multiple sectors (U.S. companies) CRITICAL 55m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 32m Global insider Cybersecurity Services CRITICAL 41m Global ransomware Multiple sectors (U.S. companies) CRITICAL 55m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h
Vulnerabilities

CVE-2020-15415

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
DrayTek Multiple Vigor Routers OS Command Injection Vulnerability — DrayTek Vigor3900, Vigor2960, and Vigor300B devices contain an OS command injection vulnerability in cgi-bin/mainfunction.cgi/cvmcfg
Published: Sep 30, 2024  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

DrayTek Multiple Vigor Routers OS Command Injection Vulnerability — DrayTek Vigor3900, Vigor2960, and Vigor300B devices contain an OS command injection vulnerability in cgi-bin/mainfunction.cgi/cvmcfgupload that allows for remote code execution via shell metacharacters in a filename when the text/x-python-script content type is used.

🤖 AI Executive Summary

CVE-2020-15415 is a critical OS command injection vulnerability (CVSS 9.0) affecting DrayTek Vigor3900, Vigor2960, and Vigor300B routers, allowing unauthenticated remote code execution via shell metacharacters in a crafted filename through the cgi-bin/mainfunction.cgi/cvmcfgupload endpoint. A public exploit is available, significantly elevating the risk of active exploitation in the wild. Successful exploitation grants full device compromise, enabling network pivoting, traffic interception, and persistent backdoor installation. Organizations relying on these routers for perimeter security or branch connectivity face immediate and severe risk.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 18, 2026 21:30
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations across multiple critical sectors are at elevated risk. Banking and financial institutions regulated by SAMA that deploy DrayTek routers at branch offices or as secondary connectivity devices could face network breaches enabling lateral movement toward core banking systems. Government entities under NCA oversight using these routers for inter-office connectivity risk exposure of sensitive data and potential APT footholds. Energy sector organizations including ARAMCO subsidiaries and NEOM infrastructure projects using these devices for OT/IT boundary routing face critical risk of operational disruption. Telecom providers such as STC and Zain KSA deploying these routers in managed service environments could expose multiple downstream customers simultaneously. SMEs and retail sectors using DrayTek as cost-effective VPN/routing solutions are particularly vulnerable due to typically weaker patch management practices.
🏢 Affected Saudi Sectors
Banking Government Energy Telecom Healthcare Education Retail SME
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS (within 24 hours):
1. Identify all DrayTek Vigor3900, Vigor2960, and Vigor300B devices in your environment using asset inventory or network scanning tools (nmap, Shodan internal queries).
2. Immediately restrict external/internet access to the management interface (port 443/80) using upstream firewall ACLs.
3. Disable remote management features on affected devices if not operationally required.
4. Check device logs for suspicious POST requests to /cgi-bin/mainfunction.cgi/cvmcfgupload with text/x-python-script content type.

PATCHING GUIDANCE:
5. Apply DrayTek firmware updates: Vigor3900 firmware v1.5.1 or later, Vigor2960 firmware v1.5.1 or later, Vigor300B firmware v1.5.1 or later — available from DrayTek official support portal.
6. Verify firmware integrity using checksums provided by DrayTek before deployment.
7. Schedule patching during maintenance windows with rollback plans in place.

COMPENSATING CONTROLS (if patching is delayed):
8. Deploy a WAF or reverse proxy in front of management interfaces to block requests containing shell metacharacters (;, |, &, $, `, >, <) in filename parameters.
9. Implement network segmentation to isolate affected routers from critical internal systems.
10. Enable IDS/IPS signatures for CVE-2020-15415 exploitation attempts on perimeter security devices.
11. Enforce allowlisting of management interface access by source IP.

DETECTION RULES:
12. SIEM alert: Monitor HTTP POST to URI containing 'cvmcfgupload' with Content-Type 'text/x-python-script'.
13. Network IDS Snort/Suricata rule: alert tcp any any -> $ROUTER_IPS [80,443] (msg:"CVE-2020-15415 DrayTek RCE Attempt"; content:"cvmcfgupload"; content:"x-python-script"; sid:2020154150; rev:1;).
14. Monitor for unexpected outbound connections from router management IPs post-exploitation.
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية (خلال 24 ساعة):
1. تحديد جميع أجهزة DrayTek Vigor3900 وVigor2960 وVigor300B في بيئتك باستخدام أدوات جرد الأصول أو فحص الشبكة.
2. تقييد الوصول الخارجي/الإنترنت فوراً إلى واجهة الإدارة (المنفذ 443/80) باستخدام قوائم التحكم في الوصول على جدار الحماية الأمامي.
3. تعطيل ميزات الإدارة عن بُعد على الأجهزة المتأثرة إذا لم تكن ضرورية تشغيلياً.
4. فحص سجلات الجهاز بحثاً عن طلبات POST مشبوهة إلى /cgi-bin/mainfunction.cgi/cvmcfgupload بنوع محتوى text/x-python-script.

إرشادات التصحيح:
5. تطبيق تحديثات البرامج الثابتة من DrayTek: Vigor3900 الإصدار v1.5.1 أو أحدث، Vigor2960 الإصدار v1.5.1 أو أحدث، Vigor300B الإصدار v1.5.1 أو أحدث — متاحة من بوابة دعم DrayTek الرسمية.
6. التحقق من سلامة البرامج الثابتة باستخدام المجاميع الاختبارية التي يوفرها DrayTek قبل النشر.
7. جدولة التصحيح خلال نوافذ الصيانة مع وضع خطط التراجع.

ضوابط التعويض (في حالة تأخر التصحيح):
8. نشر جدار حماية تطبيقات الويب أو وكيل عكسي أمام واجهات الإدارة لحظر الطلبات التي تحتوي على محارف خاصة في معاملات اسم الملف.
9. تطبيق تجزئة الشبكة لعزل الأجهزة المتأثرة عن الأنظمة الداخلية الحيوية.
10. تفعيل توقيعات IDS/IPS لمحاولات استغلال CVE-2020-15415 على أجهزة أمن المحيط.
11. تطبيق القائمة البيضاء لوصول واجهة الإدارة حسب عنوان IP المصدر.

قواعد الكشف:
12. تنبيه SIEM: مراقبة HTTP POST إلى URI يحتوي على 'cvmcfgupload' بنوع المحتوى 'text/x-python-script'.
13. قاعدة IDS للشبكة Snort/Suricata: تنبيه على الطلبات التي تحتوي على 'cvmcfgupload' و'x-python-script' معاً.
14. مراقبة الاتصالات الصادرة غير المتوقعة من عناوين IP لإدارة الموجه بعد الاستغلال.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-4-2: Cybersecurity requirements for network devices and infrastructure ECC-2-3-1: Patch and vulnerability management ECC-2-5-1: Network security and perimeter protection ECC-2-6-1: Secure configuration management for network devices ECC-3-3-1: Security monitoring and log management
🔵 SAMA CSF
3.3.2 - Vulnerability Management 3.3.5 - Network Security 3.3.6 - Infrastructure Security 3.4.2 - Patch Management 3.5.1 - Security Monitoring and Incident Management
🟡 ISO 27001:2022
A.8.8 - Management of technical vulnerabilities A.8.20 - Networks security A.8.21 - Security of network services A.8.9 - Configuration management A.8.16 - Monitoring activities
🟣 PCI DSS v4.0
Requirement 6.3.3 - All system components are protected from known vulnerabilities by installing applicable security patches Requirement 1.3 - Network access controls between trusted and untrusted networks Requirement 6.2.4 - Software engineering techniques to prevent common vulnerabilities Requirement 11.3 - External and internal vulnerability scans
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
DrayTek:Multiple Vigor Routers
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS93.00%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2024-10-21
Published 2024-09-30
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.