top of page

Critical Security Vulnerabilities in DrayTek Devices – Immediate Action Required

Writer: Craig MarstonCraig Marston

Draytek logo

Why This Security Alert Matters


Ensuring network security is essential for businesses relying on DrayTek routers. On April 11, 2024, multiple high-severity vulnerabilities were discovered, including Denial of Service (DoS), Information Disclosure, and Code Execution risks. These issues could expose your network to cyber threats, potentially leading to data breaches, system downtime, or even full remote control of affected devices.

DrayTek has responded swiftly by releasing firmware updates to patch these vulnerabilities. If you are using a DrayTek device, you must act immediately to secure your network.


Key Details of the Security Vulnerabilities


Here’s a breakdown of the vulnerabilities identified in various DrayTek models:

  • Published Date: February 28, 2025

  • CVE IDs: CVE-2024-41334 to CVE-2024-41336 & CVE-2024-41338 to CVE-2024-41340

  • Types of vulnerabilities:

    • Denial of Service (DoS) – Attackers can overload and crash the device.

    • Information Disclosure – Sensitive data may be exposed.

    • Code Execution – Remote execution of commands on the router.


Severity Ratings (CVSS Scores)

CVE Number

Severity (CVSS Score)

CVE-2024-41334

9.8 (Critical)

CVE-2024-41335

7.5 (High)

CVE-2024-41336

7.5 (High)

CVE-2024-41338

7.5 (High)

CVE-2024-41339

9.8 (Critical)

CVE-2024-41340

8.4 (High)

With two critical vulnerabilities (CVSS 9.8) and several high-risk ones, immediate patching is necessary to prevent exploits.


What You Need to Do – Urgent Action Required


To protect your DrayTek routers from potential attacks, follow these steps:


1. Upgrade Firmware Immediately

  • Locate your device in the table below and download the latest firmware update from DrayTek’s official website.

  • Before upgrading:

    • Back up your current configuration (System Maintenance > Config Backup).

    • Use the “.ALL” firmware file to retain your settings.

    • If upgrading from an older version, review the release notes for any special instructions.


2. Disable Remote Access (If Enabled)

  • Turn off remote access unless absolutely necessary.

  • Enable Two-Factor Authentication (2FA) for better security.

  • If using SSL VPN, disable it until you apply the update.


3. Check Firewall and Security Settings

  • Ensure firewall rules are properly configured.

  • Monitor for suspicious network activity.


List of Affected DrayTek Models and Fixed Firmware Versions


To simplify the update process, here is a detailed table of the affected DrayTek routers, along with their fixed firmware versions and links to images.


DrayTek Model

Fixed Firmware Version

Image Link

Vigor165

4.2.7

Vigor166

4.2.7

Vigor2133

3.9.9

Vigor2135

4.4.5.3

Vigor2620 LTE

3.9.8.9

Vigor2762

3.9.9

Vigor2763

4.4.5.3

Vigor2765

4.4.5.3

Vigor2766

4.4.5.3

Vigor2832

3.9.9

Vigor2860 / 2860 LTE

3.9.8

Vigor2862 / 2862 LTE

3.9.9.5

Vigor2865 / 2865 LTE

4.4.5.2

Vigor2866 / 2866 LTE

4.4.5.2

Vigor2915

4.4.3.2

Vigor2925 / 2925 LTE

3.9.8

Vigor2926 / 2926 LTE

3.9.9.5

Vigor2927 / 2927 LTE / 2927L-5G

4.4.5.5

Vigor2952 / 2952 LTE

3.9.8.2

Vigor3220n

3.9.8.2

Vigor1000B

4.3.2.8

Vigor2962

4.3.2.8 / 4.4.3.1

Vigor3910

4.3.2.8 / 4.4.3.1

Vigor3912

4.3.6.1


So to Wrap Up


This DrayTek security alert highlights the critical importance of firmware updates. With vulnerabilities allowing Denial of Service, Information Disclosure, and Code Execution, businesses must take immediate action to protect their networks.

To secure your DrayTek router, follow these steps:

  1. Download and install the latest firmware.

  2. Disable remote access and apply security best practices.

  3. Monitor network activity for any suspicious behaviour.

For full security details and official updates, visit DrayTek’s Security Advisory.


🚀 Stay protected, stay updated! 🚀

If you need any assistance please reach out to us. We have IT experts ready to assist.


 
 
 

Comments


bottom of page