A tiny glitch in DrayTek Vigor routers could let hackers seize control remotely. It's a stark reminder that even the smallest bug can open the door to big risks. Have you updated your firmware yet?

https://thedefendopsdiaries.com/cve-2025-10547-critical-remote-code-execution-vulnerability-in-draytek-vigor-routers/

#cve202510547
#draytek
#remotecodeexecution
#routersecurity
#firmwareupdate

CVE-2025-10547: Critical Remote Code Execution Vulnerability in DrayTek Vigor Routers

Explore the critical CVE-2025-10547 vulnerability in DrayTek Vigor routers, its risks, mitigation steps, and industry-wide security lessons.

The DefendOps Diaries

New blog post: https://blog.mei-home.net/posts/snmp-exporter/

A short one this time, about my setup for getting some SNMP data provided by my DrayTek VDSL modem into Prometheus.

#HomeLab #Blog #Prometheus #DrayTek

Gathering SNMP Metrics with the SNMP Exporter

Gathering metrics from a DrayTek VDSL modem

ln --help

Critical vulnerabilities have been exposed in DrayTek routers, putting devices at risk. Make sure your network is secure by staying updated on the latest cybersecurity threats.

#CyberSecurity #DrayTek #Vulnerability https://zurl.co/E1PhU

Critical Vulnerabilities in DrayTek Routers Exposes Devices to RCE Attack

A series of critical vulnerabilities in DrayTek Vigor routers—widely deployed in small office/home office (SOHO) environments.

Cyber Security News
Warnung vor Angriffen auf neue SAP-Netweaver-Lücke, Chrome und Draytek-Router

Die US-amerikanische IT-Sicherheitsbehörde CISA warnt vor Angriffen auf eine neue SAP-Netweaver-Lücke sowie auf Chrome und Draytek-Router.

heise online

#BSI: #DrayTek #Vigor: Mehrere Schwachstellen

Es bestehen mehrere Schwachstellen in DrayTek Vigor Routern. Ein Angreifer kann diese ausnutzen, um Daten zu stehlen, Sicherheitsmaßnahmen zu umgehen, das Gerät zum Absturz zu bringen und Schadcode auszuführen.

https://wid.cert-bund.de/portal/wid/buergercert/details?uuid=735d2ad1-6722-431e-8e5d-3c673ef54837

Warn- und Informationsdienst

Jemand hier Ahnung von Mesh-Wifi mit #Draytek Geräten? Konkret ein 2865Lac und 2x AP903 (wired uplink).

Mein Mesh funzt, aber die APs nehmen partout die Configsync vom Router nicht an (außer SSID1).

Jemand eine Idee warum?

🚨 Following reports of widespread DrayTek router reboots, GreyNoise is bringing awareness to in-the-wild activity against multiple known vulnerabilities in DrayTek devices. Read the analysis ⬇️

https://www.greynoise.io/blog/in-the-wild-activity-against-draytek-routers

#GreyNoise #ThreatIntel #Cybersecurity #DrayTek

Amid Reports of Worldwide Reboots, GreyNoise Observes In-the-Wild Activity Against DrayTek Routers

GreyNoise is bringing awareness to in-the-wild activity against several known vulnerabilities in DrayTek devices CVE-2020-8515, CVE-2021-20123, and CVE-2021-20124.

DrayTek router chaos! 🌐 Wereldwijd internetproblemen. Netwerkbeheerders, controleer je systemen en update je firmware! #TechNews #DrayTek 
https://itinsights.nl/analyses/draytek-router-apocalyps-internet-ploft-volledig-uit/
DrayTek Router Apocalyps: Internet Ploft Volledig Uit!

Wereldwijd ervaren internetproviders en netwerkbeheerders momenteel aanzienlijke uitdagingen met DrayTek routers, wat wijst op een grootschalige connectiviteitsproblematiek die begon in het weekend.

IT INSIGHTS

#Draytek a publié en scred une documentation mais n'a pas vraiment communiqué sur le problème...

La mise en place d'ACL a l'air de fonctionner. Parce que désactiver les VPN c'est gentil mais ce n'est pas possible partout :/.

Et pour remplacer les routeurs, il faut que les clients acceptent les devis.

https://faq.draytek.com.au/docs/draytek-routers-rebooting-how-to-solve-this-issue/

#vismaviedetech #vismaviededirtech

DrayTek routers rebooting- How to solve this issue

Several clients have reported a reboot issue this morning. The solution is to disconnect the WAN and then try to upgrade to the latest firmware (not applicable if the latest firmware is older than 2024. e.g 2760 does not have this patch). Try the TFTP firmware upgrade if the normal upgrade using the WEB UI does

DrayTek FAQ

Hey folks, ready for your daily dose of cyber intel? ☕️

Tuesday's update is out and it's packed with need-to-know updates:

🚨 Critical Next.js Flaw: Authorization bypass vulnerability (CVE-2025-29927) impacting versions before 15.2.3. Upgrade ASAP or block those 'x-middleware-subrequest' headers!

🐜 Weaver Ant's Long Game: Chinese hackers spied on a telco network for four years using compromised Zyxel routers and custom web shells. Talk about persistence!

🐍 VanHelsing RaaS Emerges: A new ransomware player targeting Windows, ARM, ESXi systems. Keep an eye on this one!

☁️ Oracle Cloud Breach Claims: Did they or didn't they? Oracle denies a breach, but a threat actor is claiming otherwise.

🚂 Ukrainian Railway Hit: Cyberattack disrupts online ticket sales amidst crucial transport operations. Resilience is key.

🔄 DrayTek Router Chaos: ISPs are scrambling as DrayTek routers enter reboot loops. Potential vulnerability or buggy update at play.

🤖 AI-Enhanced Cybercrime: Europol warns that organized crime is leveling up with AI, partnering with state-aligned entities.

🛰️ Starlink Intercepted: Thai authorities seize Starlink transmitters headed for Myanmar scam centers. Criminals are finding ways around cut-offs.

🚓 Cybercrime Crackdown: 300+ suspects arrested in Africa for cyber scams. A win for international law enforcement!

🧬 23andMe's Bankruptcy Woes: Privacy advocates raise concerns about DNA data as 23andMe files for bankruptcy. What happens to all that genetic info?

🔒 Pennsylvania County Ransomware: Sensitive data stolen during a ransomware attack. Another reminder to shore up those defenses.

👁️‍🗨️ China Bans Facial Recognition: Consent is now required for facial recognition in China. But are there exceptions for government and AI training?

👉 Dive into the full details here: https://opalsec.io/daily-news-update-tuesday-march-25-2025-australia-melbourne/

Stay vigilant, stay informed, and let's keep the digital world a little safer, one update at a time. 🛡️

#Cyber #CyberSec #Cybersecurity #InfoSec #ThreatIntelligence #ThreatIntel #Ransomware #NextJS #China #AI #Cybercrime #DataBreach #Privacy #Starlink #Europol #Vulnerability #WeaverAnt #VanHelsing #OracleCloud #Ukraine #DrayTek #23andMe #CyberAttack #infosecurity #Privacy #DataPrivacy #AI #InfoSecNews #News

Daily News Update: Tuesday, March 25, 2025 (Australia/Melbourne)

Audio Summary: Tuesday, March 25, 2025 (Australia/Melbourne)0:00/390.3121× Critical Flaw in Next.js Allows Authorization Bypass A critical severity vulnerability, tracked as CVE-2025-29927, has been discovered in the Next.js web development framework, potentially allowing attackers to bypass authorization checks. The flaw enables attackers to send

Opalsec