Over 200,000 DrayTek routers vulnerable to total device takeover
The routers are popular with small and medium businesses, but are easily exploitable by threat actors seeking to steal data or launch ransomware


Over 200,000 routers made by DrayTek are subject to a serious vulnerability, which could open companies up to network breaches.
The DrayTek Vigor 3910 is currently vulnerable to complete compromise by threat actors and is particularly at risk if it has an internet-facing management interface.
Researchers from cybersecurity firm Trellix identified the vulnerability within the model in a blog post, as well as within 28 other devices from DrayTek that share the same code base. They stressed that at present, there are no examples of threat actors in the wild using the vulnerability.
The researchers have warned companies that once routers are compromised, they leave a network open to malicious action such as intellectual property theft, stolen passwords, data breaches, or a ransomware attack.
DrayTek is a Taiwanese manufacturer of routers that cater to so-called ‘SoHo’ small and medium businesses (SMBs), with their products often used to provide remote-working employees with virtual private network (VPN) access.
Because of a logic bug in its code, threat actors can exploit the management interface of the affected routers by inputting a base64 encoded string as username and password when prompted. This causes a buffer overflow on its login page, allowing a takeover of the router’s ‘DrayOS’.
The attack can be undertaken over the router’s local area network (LAN). If the management interface of the router is configured to be internet facing, the attack can be carried out remotely over the internet.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Researchers have issued several recommendations, including keeping firmware up-to-date, preventing the management interface from being exposed to the internet if possible, and changing the password to any affected devices.
The vulnerability has been filed under CVE-2022-32548 and Trelix was quick to praise DrayTek for releasing a firmware patch within 30 days of being made aware of the issue.
“A firewall or other piecemeal cybersecurity tool is not a cybersecurity strategy. Small businesses must not underestimate their value to an attacker and adopt a mindset and strategy centred on when they will be targeted versus if," commented Philippe Laulheret, senior security researcher at Trellix.
"SMBs can't underestimate the value of their data and IP, or the potential for their edge devices to be leveraged in botnet attack, or even the risk of becoming a steppingstone for attackers to compromise SMBs' customer networks.”

Rory Bathgate is Features and Multimedia Editor at ITPro, overseeing all in-depth content and case studies. He can also be found co-hosting the ITPro Podcast with Jane McCallion, swapping a keyboard for a microphone to discuss the latest learnings with thought leaders from across the tech sector.
In his free time, Rory enjoys photography, video editing, and good science fiction. After graduating from the University of Kent with a BA in English and American Literature, Rory undertook an MA in Eighteenth-Century Studies at King’s College London. He joined ITPro in 2022 as a graduate, following four years in student journalism. You can contact Rory at rory.bathgate@futurenet.com or on LinkedIn.
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard Published
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd Published
-
Hackers are targeting Ivanti VPN users again – here’s what you need to know
News Ivanti has re-patched a security flaw in its Connect Secure VPN appliances that's been exploited by a China-linked espionage group since at least the middle of March.
By Emma Woollacott Published
-
Broadcom issues urgent alert over three VMware zero-days
News The firm says it has information to suggest all three are being exploited in the wild
By Solomon Klappholz Published
-
Nakivo backup flaw still present on some systems months after firms’ ‘silent patch’, researchers claim
News Over 200 vulnerable Nakivo backup instances have been identified months after the firm silently patched a security flaw.
By Solomon Klappholz Published
-
Everything you need to know about the Microsoft Power Pages vulnerability
News A severe Microsoft Power Pages vulnerability has been fixed after cyber criminals were found to have been exploiting unpatched systems in the wild.
By Solomon Klappholz Published
-
Billions of IoT devices will need to be secured in the next four years – zero trust could be the key to success
News Researchers have warned more than 28 billion IoT devices will need to be secured by 2028 as attacks on connected devices surge.
By Emma Woollacott Published
-
Cisco claims new smart switches provide next-level perimeter defense
News Cisco’s ‘security everywhere’ mantra has just taken on new meaning with the launch of a series of smart network switches.
By Solomon Klappholz Published
-
Five Eyes cyber agencies issue guidance on edge device vulnerabilities
News Cybersecurity agencies including the NCSC and CISA have issued fresh guidance on edge device security.
By Emma Woollacott Published
-
Vulnerability management complexity is leaving enterprises at serious risk
News Fragmented data and siloed processes mean remediation is taking too long
By Emma Woollacott Published