Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

DrayOS Routers Vulnerability Let Attackers Execute Malicious Code Remotely

Posted on October 3, 2025October 3, 2025 By CWS

A vital vulnerability has been found in DrayTek’s DrayOS routers, which may permit unauthenticated distant attackers to execute malicious code.

The flaw, tracked as CVE-2025-10547, impacts a variety of Vigor router fashions, prompting directors to use safety updates urgently.

The vulnerability, detailed in safety advisory DSA-2025-005 launched on October 2, 2025, is classed as a “Use of Uninitialized Variable” weak spot.

It may be triggered when an attacker sends specifically crafted HTTP or HTTPS requests to the gadget’s Net Consumer Interface (WebUI). A profitable exploit may cause reminiscence corruption, resulting in a system crash.

DrayOS Routers Vulnerability

Extra critically, underneath sure situations, this reminiscence corruption might be leveraged by an attacker to realize distant code execution (RCE) on the compromised gadget.

For the reason that assault vector is the WebUI, any router with this interface uncovered to the web is at excessive danger. The vulnerability was initially recognized on July 22, and its public disclosure highlights the potential for widespread influence given the recognition of DrayTek routers in enterprise environments.

DrayTek has outlined a number of mitigation methods to guard towards this risk. Probably the most speedy protection towards exterior assaults is to disable distant entry to the WebUI and SSL VPN providers from the WAN.

Correctly configured Entry Management Lists (ACLs) may also function a barrier to stop unauthorized entry from the web.

Nonetheless, these measures don’t provide full safety, as an attacker who has already gained entry to the native community can nonetheless exploit the vulnerability by the LAN-side WebUI.

For some fashions, it’s attainable to additional phase native entry utilizing VLANs and extra ACLs. Regardless of these short-term fixes, DrayTek strongly emphasizes that the one method to totally resolve the vulnerability and guarantee full safety is to improve the gadget firmware to the really useful patched model.

Affected Merchandise and Mitigations

The vulnerability impacts an intensive checklist of DrayTek’s Vigor router sequence. Affected fashions embody the Vigor1000B, Vigor2962, Vigor3910, Vigor3912, Vigor2135, and varied fashions inside the Vigor276x, Vigor286x, Vigor291x, Vigor292x, and Vigor295x sequence, amongst many others.

DrayTek has launched particular firmware updates for every affected product line. For instance, Vigor2962 customers ought to improve to model 4.4.3.6 or 4.4.5.1, whereas Vigor2865 Collection customers want to put in model 4.5.1 or later.

The corporate prolonged its appreciation to Pierre-Yves MAES from ChapsVision for responsibly disclosing the vulnerability.

All customers of affected DrayTek merchandise are urged to seek the advice of the official advisory for an entire checklist of fashions and their corresponding minimal firmware variations to use the mandatory patches instantly.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Code, DrayOS, Execute, Malicious, Remotely, Routers, Vulnerability

Post navigation

Previous Post: How Passwork 7 Addresses Complexity of Enterprise Security
Next Post: TOTOLINK X6000R Router Vulnerabilities Let Remote Attackers Execute Arbitrary Commands

Related Posts

20 Best Inventory Management Tools in 2025 Cyber Security News
NodeBB Vulnerability Let Attackers Inject Boolean-Based Blind and PostgreSQL Error-Based Payloads Cyber Security News
Critical FortiSIEM Vulnerability Let Attackers to Execute Malicious Commands Cyber Security News
17,000+ VMware ESXi Servers Vulnerable to Critical Integer-Overflow Vulnerability Cyber Security News
Apache Tomcat Coyote Vulnerability Let Attackers Trigger DoS Attack Cyber Security News
Hackers Leverage GitHub Notifications to Mimic as Y Combinator to Steal Funds from Wallets Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News