Draytek Vigor Routers firmware versions below 3.9.6/4.2.4...
Critical severity
Unreviewed
Published
Jun 1, 2023
to the GitHub Advisory Database
•
Updated Apr 4, 2024
Description
Published by the National Vulnerability Database
Jun 1, 2023
Published to the GitHub Advisory Database
Jun 1, 2023
Last updated
Apr 4, 2024
Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.
References