Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

DrayOS Routers Vulnerability Let Attackers Execute Malicious Code Remotely

Posted on October 3, 2025October 3, 2025 By CWS

A vital vulnerability has been found in DrayTek’s DrayOS routers, which may permit unauthenticated distant attackers to execute malicious code.

The flaw, tracked as CVE-2025-10547, impacts a variety of Vigor router fashions, prompting directors to use safety updates urgently.

The vulnerability, detailed in safety advisory DSA-2025-005 launched on October 2, 2025, is classed as a “Use of Uninitialized Variable” weak spot.

It may be triggered when an attacker sends specifically crafted HTTP or HTTPS requests to the gadget’s Net Consumer Interface (WebUI). A profitable exploit may cause reminiscence corruption, resulting in a system crash.

DrayOS Routers Vulnerability

Extra critically, underneath sure situations, this reminiscence corruption might be leveraged by an attacker to realize distant code execution (RCE) on the compromised gadget.

For the reason that assault vector is the WebUI, any router with this interface uncovered to the web is at excessive danger. The vulnerability was initially recognized on July 22, and its public disclosure highlights the potential for widespread influence given the recognition of DrayTek routers in enterprise environments.

DrayTek has outlined a number of mitigation methods to guard towards this risk. Probably the most speedy protection towards exterior assaults is to disable distant entry to the WebUI and SSL VPN providers from the WAN.

Correctly configured Entry Management Lists (ACLs) may also function a barrier to stop unauthorized entry from the web.

Nonetheless, these measures don’t provide full safety, as an attacker who has already gained entry to the native community can nonetheless exploit the vulnerability by the LAN-side WebUI.

For some fashions, it’s attainable to additional phase native entry utilizing VLANs and extra ACLs. Regardless of these short-term fixes, DrayTek strongly emphasizes that the one method to totally resolve the vulnerability and guarantee full safety is to improve the gadget firmware to the really useful patched model.

Affected Merchandise and Mitigations

The vulnerability impacts an intensive checklist of DrayTek’s Vigor router sequence. Affected fashions embody the Vigor1000B, Vigor2962, Vigor3910, Vigor3912, Vigor2135, and varied fashions inside the Vigor276x, Vigor286x, Vigor291x, Vigor292x, and Vigor295x sequence, amongst many others.

DrayTek has launched particular firmware updates for every affected product line. For instance, Vigor2962 customers ought to improve to model 4.4.3.6 or 4.4.5.1, whereas Vigor2865 Collection customers want to put in model 4.5.1 or later.

The corporate prolonged its appreciation to Pierre-Yves MAES from ChapsVision for responsibly disclosing the vulnerability.

All customers of affected DrayTek merchandise are urged to seek the advice of the official advisory for an entire checklist of fashions and their corresponding minimal firmware variations to use the mandatory patches instantly.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Code, DrayOS, Execute, Malicious, Remotely, Routers, Vulnerability

Post navigation

Previous Post: Unauthenticated RCE Flaw Patched in DrayTek Routers
Next Post: TOTOLINK X6000R Router Vulnerabilities Let Remote Attackers Execute Arbitrary Commands

Related Posts

Android Security Update – Patch for Vulnerabilities that Allows Privilege Escalation Cyber Security News
ChatGPT Atlas Stores OAuth Tokens Unencrypted Leads to Unauthorized Access to User Accounts Cyber Security News
CISOs Playbook for Managing Boardroom Cybersecurity Concerns Cyber Security News
CISA Warns of Microsoft SharePoint server 0-Day RCE Vulnerability Exploited in Wild Cyber Security News
81% Router Usres Have Not Changed Default Admin Passwords, Exposing Devices to Hackers Cyber Security News
800+ npm Packages and Thousands of GitHub Repos Compromised Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark