Colin Mc Hugo

0 %
Colin Mc Hugo
Security Engineer Manager & CEO at Quantum Infinite Solutions Group Ltd.

Critical RCE Bug Could Let Hackers Remotely Take Over DrayTek Vigor Routers

August 4, 2022
DrayTek Vigor Routers

As numerous as 29 various router designs from DrayTek have actually been determined as influenced by a brand-new essential, unauthenticated, remote code implementation susceptability that, if effectively made use of, might bring about complete concession of the gadget as well as unapproved accessibility to the wider network.

” The assault can be executed without customer communication if the administration user interface of the gadget has actually been set up to be internet encountering,” Trellix scientist Philippe Laulheretsaid “A one-click assault can additionally be executed from within the LAN in the default gadget setup.”

Submitted under CVE-2022-32548, the susceptability has actually obtained the optimum seriousness score of 10.0 on the CVSS racking up system, owing to its capability to totally permit an enemy to confiscate control of the routers.


At its core, the imperfection is the outcome of a barrier overflow problem in the internet administration user interface (“/ cgi-bin/wlogin. cgi”), which can be weaponized by a destructive star by providing specifically crafted input.

” The repercussion of this assault is a requisition of the supposed ‘DrayOS’ that carries out the router capabilities,” Laulheret claimed. “On tools that have an underlying Linux os (such as the Vitality 3910) it is after that feasible to pivot to the underlying os as well as develop a trusted footing on the gadget as well as neighborhood network.”

DrayTek Vigor Routers

Over 200,000 tools from the Taiwanese maker are claimed to have the at risk solution presently subjected online as well as would certainly call for no customer communication to be made use of.

The violation of a network home appliance such as Vitality 3910 might not just leave a network open up to destructive activities such as credential as well as copyright burglary, botnet task, or a ransomware assault, yet additionally trigger a denial-of-service (DoS) problem.


The disclosure comes a little over a month after it arised that routers from ASUS, Cisco, DrayTek, as well as NETGEAR are under attack from a brand-new malware called ZuoRAT targeting North American as well as European networks.

While there are no indicators of exploitation of the susceptability in the wild up until now, it’s suggested to use the firmware patches immediately to safeguard versus prospective hazards.

” Side tools, such as the Vitality 3910 router, survive on the limit in between interior as well as exterior networks,” Laulheret kept in mind. “Therefore they are a prime target for cybercriminals as well as hazard stars alike. From another location breaching side tools can bring about a complete concession of business’ interior network.”

Posted in SecurityTags:
Write a comment