Draytek warns that vigor routers can have serious security defects – here is what we know


  • Draytek Patches CVE-2025-10547, a firmware flaw allowing accidents or a remote code execution
  • Vulnerability affects routers with exposed webui or erroneous ACLs; Local access also used
  • The vigor routers are common in SMEs, making it attractive targets for persistent cyber attacks

The manufacturer of Gear Network Draytek has corrected a dangerous vulnerability found in dozens of Vigor commercial router models, and urges users to apply the fix as soon as possible.

In a security notice, Draytek said that he had discovered a vulnerability of the “uninitialized variables in firmware” in Drayos (the operating system of vigor routers) which, if it is exploited, could lead to the corruption of memory or system collisions. It also exists “potential in certain circumstances” to also use the bug for the execution of remote code.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top