Security News > 2022 > August > Critical RCE vulnerability impacts 29 models of DrayTek routers
Researchers at Trellix have discovered a critical unauthenticated remote code execution vulnerability impacting 29 models of the DrayTek Vigor series of business routers.
The vulnerability is tracked as CVE-2022-32548 and carries a maximum CVSS v3 severity score of 10.0, categorizing it as critical.
DrayTek Vigor devices became very popular during the pandemic by riding the "Work from home" wave.
A Shodan search returned over 700,000 online devices, most located in the UK, Vietnam, Netherlands, and Australia.
DreyTek quickly released security updates for all models mentioned above, so navigate to the vendor's firmware update center and locate the latest version for your model.
For information on performing the firmware update on your router, check out this guide by DreyTek.
News URL
Related news
- D-Link fixes critical RCE, hardcoded password flaws in WiFi 6 routers (source)
- SolarWinds Issues Patch for Critical ARM Vulnerability Enabling RCE Attacks (source)
- Critical Zimbra RCE vulnerability under mass exploitation (CVE-2024-45519) (source)
- DrayTek fixed critical flaws in over 700,000 exposed routers (source)
- Week in review: Critical Zimbra RCE vulnerability exploited, Patch Tuesday forecast (source)
- VMware Releases vCenter Server Update to Fix Critical RCE Vulnerability (source)
- GitLab warns of critical pipeline execution vulnerability (source)
- Exploit code released for critical Ivanti RCE flaw, patch now (source)
- Broadcom fixes critical RCE bug in VMware vCenter Server (source)
- Critical Ivanti Cloud Appliance Vulnerability Exploited in Active Cyberattacks (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-08-29 | CVE-2022-32548 | Classic Buffer Overflow vulnerability in Draytek products An issue was discovered on certain DrayTek Vigor routers before July 2022 such as the Vigor3910 before 4.3.1.1. | 0.0 |