14 Bugs in DrayTek Vigor Routers Disclosed: Admin Interfaces Widely Exposed Across Major ISPs [CVE-2024-41592]

Rapid Response

Date of Disclosure: 2024-10-02

A total of 14 vulnerabilities affecting DrayTek Vigor routers were disclosed yesterday in a report by Forescout. The vulnerabilities were scored as follows: 2 critical severity, 9 high severity, and 3 medium severity. Most of these vulnerabilities are found in DrayTek VigorConnect, the web control interface for Vigor routers.

Let’s examine the most severe vulnerability, CVE-2024-41592, which has been assigned the maximum CVSS score of 10.0. It’s a buffer overflow in the GetCGI() function of the VigorConnect Web UI that can be triggered by sending a specially crafted, excessively long query string to any of the CGI pages.

When exploited individually, CVE-2024-41592 allows a threat actor to potentially cause a Denial of Service. However, if chained with CVE-2024-41585—the second-most severe vulnerability, which is an OS command injection flaw—it is possible to gain remote root access to the host operating system. This exploit chain only affects Vigor router models 3910 and 3912.

If a router is compromised, a threat actor could leverage it to perform network reconnaissance and lateral movement to other devices within the network, deploy malware, or launch botnet activity.

FieldDetails
CVE-IDCVE-2024-41592 – CVSS 10.0 (Critical)
Vulnerability DescriptionBuffer Overflow in the “GetCGI()” function of the VigorConnect Web UI could lead to DoS or RCE
Date of DisclosureOctober 2, 2024
Affected AssetsDrayTek VigorConnect, the web-based control interface for Vigor Routers
Vulnerable Firmware Versions Vigor1000B, Vigor2962, Vigor3910, Vigor3912, Vigor165, Vigor166, Vigor2135, Vigor2763, Vigor2765, Vigor2766, Vigor2865, Vigor2866, Vigor2915, Vigor2620, VigorLTE200, Vigor2133, Vigor2762, Vigor2832, Vigor2860, Vigor2925, Vigor2862, Vigor2926, Vigor2952, Vigor3220
PoC Available?Yes
Exploitation StatusCurrently no known exploitation of these newly disclosed CVEs, but note 4 older CVEs affecting various DrayTek routers are in CISA KEV.
Patch StatusPatches are available for all affected devices, including EOL firmware versions (see table near the end for a full list of patches)

DrayTek is a Taiwan-based network equipment manufacturer. Their Vigor routers are used by small to medium sized businesses and consumers worldwide.

Vigor routers have been targeted by exploitation in the past. Just last month, the FBI reported on Chinese-sponsored botnet activity that leveraged 3 older CVEs in DrayTek routers. Last year, the Chinese state-sponsored actor Volt Typhoon was observed exploiting exposed SOHO networking equipment to carry out attacks, including DrayTek devices. 

Example VigorConnect Admin Interface Exposed on the Web

Networking admin interfaces are commonly targeted as initial access points by threat actors. When exposed on the public internet, these interfaces are easily discoverable and often exploited due to the wealth of information they provide. Compromising an admin interface can grant unauthorized access to larger networks, making them valuable for network reconnaissance and further attacks. CISA has issued directives in the past, such as Binding Operational DIrective 23-02, requiring Federal agencies to secure these networked admin interfaces from the public internet.

These administrative interfaces shouldn’t be directly accessible online outside of local networks, and should instead be protected using access controls such as firewalls or VPNs.

Let’s explore the digital footprint of exposed DrayTek Vigor routers.

Censys Perspective

As of this writing, Censys has identified 751,801 exposed DrayTek Vigor routers online. These devices are predominantly located in the United Kingdom, followed by Vietnam, the Netherlands, and Taiwan from our perspective, which aligns with findings from the original report.

Out of these, 421,476 devices are exposing the VigorConnect admin UI on the web.

Map of all publicly exposed VigorConnect Router admin interfaces on the web (created with kepler.gl)

The networks with the largest concentrations of these admin interfaces are a mix of large national ISPs and regional telecom providers. Leading the list is Taiwan-based HINET, which makes sense given that DrayTek is a Taiwanese company.

ASNAS_NameOrganizationCountryScaleHost Count
3462HINET Data Communication Business GroupHINETTaiwanMajor ISP41,969
31655ASN-GAMMATELECOMGamma TelecomU.K.Significant Telecom Provider35,866
2856BT-UK-AS BTnet UK Regional networkBritish TelecommunicationsU.K.Major ISP31,959
45899VNPT-AS-VN VNPT CorpVietnam Posts and Telecommunications GroupVietnamMajor ISP31,561
5413AS5413Daisy CommunicationsU.K.Significant Telecom Provider21,275
13037ZEN-AS Zen Internet – UKZen InternetU.K.Medium-sized ISP13,147
18403FPT-AS-AP FPT Telecom CompanyFPT TelecomVietnamMajor ISP12,132
7552VIETEL-AS-AP Viettel GroupViettel GroupVietnamMajor ISP11,756
1136KPN KPN NationalKPNNetherlandsMajor ISP9,921
3320DTAG Internet service provider operationsDeutsche Telekom AGGermanyMajor ISP7,732

It’s important to note that not all observed routers are necessarily vulnerable, as specific device versions were not available. To identify exposed VigorConnect admin page instances in your networks, you can use the following Censys queries:

Censys Search Query: [Link]

services: (http.response.status_code=200 and http.request.uri:"/weblogin.htm" and (http.response.html_title:"Vigor" or http.response.favicons.md5_hash="208b1c5af9e2cc7d46e3ec5bf4d12001"))

Censys ASM Query: [Link]

host.services: (http.response.status_code=200 and http.request.uri:"/weblogin.htm" and (http.response.html_title:"Vigor" or http.response.favicons.md5_hash="208b1c5af9e2cc7d46e3ec5bf4d12001")) or web_entity.instances: (http.response.status_code=200 and http.request.uri:"/weblogin.htm" and (http.response.html_title:"Vigor" or http.response.favicons.md5_hash="208b1c5af9e2cc7d46e3ec5bf4d12001")) 

Censys Risk Query: [Link]

risks.name="Exposed DrayTek Vigor Router"

What Can be Done?

It’s recommended to patch your DrayTek firmware according to your device model, either through the web interface or using the Firmware Upgrade utility. It’s good practice to back up your config before patching.

It’s also wise to restrict your VigorConnect admin web UIs from public remote access and enable two-factor authentication to further lower the risk of unauthorized access.

Device ModelFixed VersionsEoL?
Vigor1000B, Vigor2962, Vigor39104.3.2.8 and 4.4.3.1No
Vigor39124.3.6.1No
Vigor165, Vigor1664.2.7No
Vigor2135, Vigor2763, Vigor2765, Vigor27664.4.5.1No
Vigor2865, Vigor2866, Vigor29154.4.5.3No
Vigor2620, VigorLTE2003.9.8.9Yes
Vigor2133, Vigor2762, Vigor28323.9.9Yes
Vigor2860, Vigor29253.9.8Yes
Vigor2862, Vigor29263.9.9.5Yes
Vigor2952, Vigor32203.9.8.2Yes

Source: Forescout (p.11)

References