By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Notification
Latest News
OpenAI may use Associated Press archive for AI training
July 14, 2023
EU users can hold conversations with Google Bard from training set
July 14, 2023
Aptos, the new default font for Microsoft Office
July 14, 2023
BlackLotus UEFI bootkit sources published on GitHub
July 14, 2023
Hackers from the XDSpy cyber-espionage group attacked Russian organizations on behalf of the Ministry of Emergency Situations
July 14, 2023
Aa
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Reading: Critical RCE Vulnerability Threatens Nearly 30 DrayTek Router Models
Share
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Aa
Search
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Follow US
Security Parrot - Cyber Security News, Insights and Reviews > News > Critical RCE Vulnerability Threatens Nearly 30 DrayTek Router Models
News

Critical RCE Vulnerability Threatens Nearly 30 DrayTek Router Models

Last updated: 2022/08/05 at 11:54 PM
Security Parrot Editorial Team Published August 5, 2022
Share
SHARE

Hundreds of thousands of DrayTek Vigor routers are at risk due to a new RCE vulnerability discovered by Trellix researchers. The bug affects almost 30 models of the manufacturer’s routers, which are used by small and medium-sized businesses.

The vulnerability received the identifier CVE-2022-32548 and the maximum severity rating on the CVSS scale – 10 points out of 10 possible. Initially, the problem was found in the Vigor 3910 routers, but it soon became clear that it affects other models using the same codebase.

The researchers decided to look for bugs in DrayTek products because of their popularity: after the widespread transition to remote work, they are widely used by small and medium-sized businesses, and searching through Shodan reveals more than 700,000 devices, most of which are located in the UK, Vietnam, the Netherlands and Australia.

An attacker does not need to know the credentials or interact with the user to exploit this vulnerability: the device’s default configuration makes it possible to attack both over the Internet and over a local network. The root of the problem is that the web management interface is suffering from a buffer overflow issue on the login page.

Hackers exploiting this vulnerability are potentially able to:

  • take full control of the device;
  • access information;
  • set the stage for man-in-the-middle stealth attacks;
  • change DNS settings;
  • use the router as a DDoS bot and for mining operations;
  • navigate to other devices connected to the hacked network.

At the same time, the attack is extremely simple and does not require serious preparation and effort. It is enough to enter a specially crafted pair of credentials (in the format of base64 encoded strings) into the login fields, and the vulnerability works.

The researchers say that at least 200,000 routers they have discovered are exposed to a vulnerable service over the Internet, which means they can be attacked without user interaction or any other special conditions. It is believed that among the remaining 500,000 routers, many can also be hacked literally in one click, but only through a local network, so the potential surface of such attacks is much smaller.

Trellix experts write that the following models are vulnerable to CVE-2022-32548:

  • Vigor3910
  • Vigor1000B
  • Vigor2962 Series
  • Vigor2927 Series
  • Vigor2927 LTE Series
  • Vigor2915 Series
  • Vigor2952/2952P
  • Vigor3220 Series
  • Vigor2926 Series
  • Vigor2926 LTE Series
  • Vigor2862 Series
  • Vigor2862 LTE Series
  • Vigor2620 LTE Series
  • VigorLTE 200n
  • Vigor2133 Series
  • Vigor2762 Series
  • Vigor167
  • Vigor130
  • VigorNIC 132
  • Vigor165
  • Vigor166
  • Vigor2135 Series
  • Vigor2765 Series
  • Vigor2766 Series
  • Vigor2832
  • Vigor2865 Series
  • Vigor2865 LTE Series
  • Vigor2866 Series
  • Vigor2866 LTE Series

    Fortunately, DreyTek developers have already released updates for all the routers mentioned above, so all users are strongly advised to update the firmware of their devices as soon as possible.

Weekly Updates For Our Loyal Readers!

Security Parrot Editorial Team August 5, 2022
Share this Article
Facebook Twitter Email Copy Link Print

Archives

  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020

You Might Also Like

News

OpenAI may use Associated Press archive for AI training

July 14, 2023
News

EU users can hold conversations with Google Bard from training set

July 14, 2023
News

Aptos, the new default font for Microsoft Office

July 14, 2023
News

BlackLotus UEFI bootkit sources published on GitHub

July 14, 2023

© 2022 Parrot Media Network. All Rights Reserved.

  • Home
  • Parrot Media Group
  • Privacy Policy
  • Terms and Conditions
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Zero spam, Unsubscribe at any time.

Removed from reading list

Undo
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?