700K+ DrayTek routers are sitting ducks on the internet, open to remote hijacking

700K+ DrayTek routers are sitting ducks on the internet, open to remote hijacking

October 2, 2024 at 05:38PM

Multiple critical vulnerabilities in DrayTek routers, including a perfect 10 out of 10 CVSS severity rating, pose security risks for over 785,000 devices. Attackers could exploit these flaws to gain control, steal data, deploy ransomware, and launch denial-of-service attacks. It’s imperative for users to apply patches, employ best practices, and stay vigilant against potential exploits.

It appears from the meeting notes that there are 14 critical vulnerabilities in DrayTek routers, including a flaw with a perfect 10 out of 10 CVSS severity rating, that could potentially lead to remote-code-execution and a variety of cyber attacks. The vulnerabilities primarily exist in the routers’ web-based user interface and command-line interface.

It is estimated that there are 785,000 devices operating Wi-Fi networks that are potentially affected by these vulnerabilities. Moreover, despite DrayTek’s warning that the routers’ control panels should only be accessible from a local network, more than 704,000 DrayTek routers are exposed to the public internet, making them susceptible to exploitation.

In response to these vulnerabilities, DrayTek has issued patches for all 14 CVEs across both supported and end-of-life routers and has recommended steps for users to secure their devices, including disabling remote access capabilities, enabling two-factor authentication, implementing access control lists, network segmentation, strong passwords, and device monitoring.

The severity of the flaws has been underlined by reports of exploitation by Chinese government spies, as well as the publication of a proof-of-concept exploit that demonstrates the potential for remote, root access to the routers.

It is important for users to take steps to secure their DrayTek routers and implement the recommended best practices to mitigate the risks associated with these vulnerabilities. If you have any further questions or need additional information, please let me know.

Full Article