Vulnerability Details : CVE-2023-23313
Certain Draytek products are vulnerable to Cross Site Scripting (XSS) via the wlogin.cgi script and user_login.cgi script of the router's web application management portal. This affects Vigor3910, Vigor1000B, Vigor2962 v4.3.2.1; Vigor2865 and Vigor2866 v4.4.1.0; Vigor2927 v4.4.2.2; and Vigor2915, Vigor2765, Vigor2766, Vigor2135 v4.4.2.0; Vigor2763 v4.4.2.1; Vigor2862 and Vigor2926 v3.9.9.0; Vigor2925 v3.9.3; Vigor2952 and Vigor3220 v3.9.7.3; Vigor2133 and Vigor2762 v3.9.6.4; and Vigor2832 v3.9.6.2.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2023-23313
- cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2133n_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2133ac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2133vac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2133fvac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2762n_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2762ac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2762vac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2135ac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2135vac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2135fvac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2765ac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2766ac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2766vac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2860n_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2860n-plus_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2860vn-plus_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2860ac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2860vac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2860l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2860ln_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2832n_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2766ax_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2765ax_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2765va_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2763ac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor2135ax_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigor130_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:vigornic_132_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor3910_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor3220_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2962_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2962p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor1000b_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2952_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2952p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2927_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2927ax_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2927ac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2927vac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2927f_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2927l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2927lac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2926_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2926n_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2926ac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2926vac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2926l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2926ln_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2926lac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2925_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2925n_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2925n-plus_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2925vn-plus_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2925ac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2925vac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2925fn_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2925l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2925ln_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2915_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2915ac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2866_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2866ax_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2866ac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2866vac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2866l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2866lac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2865_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2865ax_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2865ac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2865vac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2865l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2865lac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2862_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2862n_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2862ac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2862vac_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2862b_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2862bn_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2862l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2862ln_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:draytek:virgor2862lac_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-23313
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 37 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-23313
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.1
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.8
|
2.7
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-03-07 |
6.1
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.8
|
2.7
|
NIST |
CWE ids for CVE-2023-23313
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2023-23313
-
https://www.horizonconsulting.com/advisories23-Multiple-XSS-Stored-in-DrayTek-routers-CVE-2023-23313
Multiple XSS (Stored) in DrayTek routers - CVE-2023-23313 | Horizon Consulting
-
https://www.draytek.com/about/security-advisory/cross-site-scripting-vulnerability-%28cve-2023-23313%29/
Cross-Site Scripting vulnerability (CVE-2023-23313) | DrayTek
-
https://www.draytek.com/about/security-advisory/cross-site-scripting-vulnerability-(cve-2023-23313)/
Cross-Site Scripting vulnerability (CVE-2023-23313) | DrayTekVendor Advisory
Jump to