vulnerability
DrayTek Vigor Routers: CVE-2025-10547: Use of Uninitialized Variable
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | Oct 2, 2025 | Oct 3, 2025 | Oct 3, 2025 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Oct 2, 2025
Added
Oct 3, 2025
Modified
Oct 3, 2025
Description
On July 22, a security vulnerability was identified in DrayOS routers. The vulnerability can be triggered when unauthenticated remote attackers send crafted HTTP or HTTPS requests to the device's Web User Interface (WebUI).
Successful exploitation may cause memory corruption and a system crash, with the potential in certain circumstances could allow remote code execution.
Routers are shielded from WAN-based attacks if remote access to the WebUI and SSL VPN services is disabled, or if Access Control Lists (ACLs) are properly configured. Nevertheless, an attacker with access to the local network could still exploit the vulnerability via the WebUI.
Local access to the WebUI can be controlled on some models using LAN side VLANs and ACLs. To ensure full protection, we strongly recommend upgrading the firmware.
Successful exploitation may cause memory corruption and a system crash, with the potential in certain circumstances could allow remote code execution.
Routers are shielded from WAN-based attacks if remote access to the WebUI and SSL VPN services is disabled, or if Access Control Lists (ACLs) are properly configured. Nevertheless, an attacker with access to the local network could still exploit the vulnerability via the WebUI.
Local access to the WebUI can be controlled on some models using LAN side VLANs and ACLs. To ensure full protection, we strongly recommend upgrading the firmware.
Solution
draytek-vigor-router-upgrade-latest
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.