CVE-2025-10547

9.8 CRITICAL

📋 TL;DR

An uninitialized variable vulnerability in DrayOS HTTP CGI request processing allows remote attackers to execute arbitrary code on Vigor Routers through memory corruption. This affects all Vigor Routers running vulnerable DrayOS versions. Attackers can gain full control of affected devices.

💻 Affected Systems

Products:
  • Vigor Routers running DrayOS
Versions: Specific versions not detailed in references; all vulnerable DrayOS versions prior to patch
Operating Systems: DrayOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects routers with HTTP/HTTPS management interfaces enabled (default configuration).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of router with persistent backdoor installation, credential theft, network traffic interception, and lateral movement to internal networks.

🟠

Likely Case

Router takeover leading to network disruption, DNS hijacking, credential harvesting, and deployment of malware to connected devices.

🟢

If Mitigated

Limited impact if routers are behind firewalls with strict inbound filtering and network segmentation prevents lateral movement.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices directly accessible from WAN interfaces.
🏢 Internal Only: MEDIUM - Internal exploitation possible if attacker gains internal network access through other means.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Memory corruption vulnerabilities in network appliances are frequently weaponized. No public PoC yet but technical details are available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Draytek security advisory for specific firmware versions

Vendor Advisory: https://www.draytek.com/about/security-advisory/use-of-uninitialized-variable-vulnerabilities/

Restart Required: Yes

Instructions:

1. Access router web interface. 2. Navigate to System Maintenance > Firmware Upgrade. 3. Download latest firmware from Draytek support portal. 4. Upload and apply firmware update. 5. Reboot router.

🔧 Temporary Workarounds

Disable Remote Management

all

Disable HTTP/HTTPS management access from WAN interfaces

Restrict Management Access

all

Configure firewall rules to allow management only from trusted IP addresses

🧯 If You Can't Patch

  • Segment network to isolate routers from critical assets
  • Implement strict inbound firewall rules blocking all unnecessary ports to router WAN interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version against Draytek security advisory. If running vulnerable DrayOS version, device is affected.

Check Version:

Login to router web interface and check System Information > Firmware Version

Verify Fix Applied:

Verify firmware version has been updated to patched version specified in Draytek advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to CGI endpoints
  • Multiple failed login attempts followed by successful exploitation
  • Unexpected process execution in system logs

Network Indicators:

  • Unusual outbound connections from router
  • DNS queries to suspicious domains
  • Traffic patterns indicating command and control

SIEM Query:

source="router_logs" AND (uri="*.cgi" OR uri="*.pl") AND status=200 AND user_agent="*exploit*"

🔗 References

📤 Share & Export