Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
DrayOS Routers Vulnerability Let Attackers Execute Malicious Code Remotely

DrayOS Routers Vulnerability Let Attackers Execute Malicious Code Remotely

Posted on October 3, 2025October 3, 2025 By CWS

A vital vulnerability has been found in DrayTek’s DrayOS routers, which may permit unauthenticated distant attackers to execute malicious code.

The flaw, tracked as CVE-2025-10547, impacts a variety of Vigor router fashions, prompting directors to use safety updates urgently.

The vulnerability, detailed in safety advisory DSA-2025-005 launched on October 2, 2025, is classed as a “Use of Uninitialized Variable” weak spot.

It may be triggered when an attacker sends specifically crafted HTTP or HTTPS requests to the gadget’s Net Consumer Interface (WebUI). A profitable exploit may cause reminiscence corruption, resulting in a system crash.

DrayOS Routers Vulnerability

Extra critically, underneath sure situations, this reminiscence corruption might be leveraged by an attacker to realize distant code execution (RCE) on the compromised gadget.

For the reason that assault vector is the WebUI, any router with this interface uncovered to the web is at excessive danger. The vulnerability was initially recognized on July 22, and its public disclosure highlights the potential for widespread influence given the recognition of DrayTek routers in enterprise environments.

DrayTek has outlined a number of mitigation methods to guard towards this risk. Probably the most speedy protection towards exterior assaults is to disable distant entry to the WebUI and SSL VPN providers from the WAN.

Correctly configured Entry Management Lists (ACLs) may also function a barrier to stop unauthorized entry from the web.

Nonetheless, these measures don’t provide full safety, as an attacker who has already gained entry to the native community can nonetheless exploit the vulnerability by the LAN-side WebUI.

For some fashions, it’s attainable to additional phase native entry utilizing VLANs and extra ACLs. Regardless of these short-term fixes, DrayTek strongly emphasizes that the one method to totally resolve the vulnerability and guarantee full safety is to improve the gadget firmware to the really useful patched model.

Affected Merchandise and Mitigations

The vulnerability impacts an intensive checklist of DrayTek’s Vigor router sequence. Affected fashions embody the Vigor1000B, Vigor2962, Vigor3910, Vigor3912, Vigor2135, and varied fashions inside the Vigor276x, Vigor286x, Vigor291x, Vigor292x, and Vigor295x sequence, amongst many others.

DrayTek has launched particular firmware updates for every affected product line. For instance, Vigor2962 customers ought to improve to model 4.4.3.6 or 4.4.5.1, whereas Vigor2865 Collection customers want to put in model 4.5.1 or later.

The corporate prolonged its appreciation to Pierre-Yves MAES from ChapsVision for responsibly disclosing the vulnerability.

All customers of affected DrayTek merchandise are urged to seek the advice of the official advisory for an entire checklist of fashions and their corresponding minimal firmware variations to use the mandatory patches instantly.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Code, DrayOS, Execute, Malicious, Remotely, Routers, Vulnerability

Post navigation

Previous Post: Unauthenticated RCE Flaw Patched in DrayTek Routers
Next Post: TOTOLINK X6000R Router Vulnerabilities Let Remote Attackers Execute Arbitrary Commands

Related Posts

Critical Chrome Security Flaws Allow Remote Code Execution Critical Chrome Security Flaws Allow Remote Code Execution Cyber Security News
Iranian Hackers Target Omani Ministries: Data Theft Uncovered Iranian Hackers Target Omani Ministries: Data Theft Uncovered Cyber Security News
Implementing NIST CSF 2.0 A Technical Blueprint Implementing NIST CSF 2.0 A Technical Blueprint Cyber Security News
Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT Cyber Security News
Critical Nessus Agent Flaw on Windows Allows System-Level Code Execution Critical Nessus Agent Flaw on Windows Allows System-Level Code Execution Cyber Security News
OpenAI Banned ChatGPT Accounts Used by Chinese Hackers to Develop Malware OpenAI Banned ChatGPT Accounts Used by Chinese Hackers to Develop Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark