Draytek Critical Vulnerabilities CVE-2024-41334 (and others)

The Curious Codex

             9 Votes  
100% Human Generated
2025-03-14 Published, 2025-04-01 Updated
515 Words, 3  Minute Read

The Author
GEN UK Blog

Adam Jones (Infrastructure)

Adam has been with the firm since 2001.

 

CVE-2024-41334 9.8

On April 11th 2024, Draytek were made aware of a number of vulnerabilities in their Draytek Vigor range of routers, including Denial of Service (DDoS), Information disclosure, and Code Execution (RCE). Draytek have addressed these issues in firmware, and users MUST upgrade to the latest safe version, or preferably the latest version.

CVE-2024-41334 CVE-2024-41335 CVE-2024-41336 CVE-2024-41338 CVE-2024-41339 CVE-2024-41340

ALWAYS ENSURE YOUR NETWORKING HARDWARE IS RUNNING UP TO DATE FIRMWARE

Affected Products & Safe Firmware

Router Model Safe Firmware Version
Vigor1654.2.7
Vigor1664.2.7
Vigor21333.9.9
Vigor21354.4.5.3
Vigor2620 LTE3.9.8.9
Vigor27623.9.9
Vigor27634.4.5.3
Vigor27654.4.5.3
Vigor27664.4.5.3
Vigor28323.9.9
Vigor2860 / 2860 LTE3.9.8
Vigor2862 / 2862 LTE3.9.9.5
Vigor2865 / 2865 LTE4.4.5.2
Vigor2866 / 2866 LTE4.4.5.2
Vigor29154.4.3.2
Vigor2925 / 2925 LTE3.9.8
Vigor2926 / 2926 LTE3.9.9.5
Vigor2927 / 2927 LTE / 2927L-5G4.4.5.5
Vigor2952 / 2952 LTE3.9.8.2
Vigor3220n3.9.8.2
Vigor1000B4.3.2.8
Vigor29624.3.2.8 / 4.4.3.1
Vigor39104.3.2.8 / 4.4.3.1
Vigor39124.3.6.1

IMPORTANT

DO NOT attempt to update affected devices remotely, they can be forced to reboot due to online DoS/RCE and this will break the firmware upgrade in some cases rendering the router dead, requiring a replacement or TFTP firmware provisioning locally.

Mitigations

If you are unable to update the device firmware, CVE-2024-51138/9 can be somewhat mitigated by

  • Disable Remote Access
  • Disable SSL VPN

However, it is strongly recommended to update the firmware ASAP. This in most cases simply means flashing the .all firmware file specific to your router, but if that fails repeatedly, then you will need to factory reset, flash and then reconfigure.

Obsolete Hardware

Customers with 2830 who are having issues, do not have a firmware patch available since these models were EOL in 2020. You *should* upgrade to the 2865, but disabling remote management, and SSL VPN should mitigate the issue.

Can't Access the web interface?

In some cases the router isn't sufficiently stable to use the web interface, with the router rebooting before you can login or make any changes. In this case, telnet/ssh can be used. The actual command to telnet/ssh into the router varies by operating system, and the commands on the router to disable VPN and remote management also vary by model, so you will need to research this, or book time at the HelpDesk.

Why did it take almost a year?

Well, it didn't and anyone reporting this is plain wrong. Draytek provided patched firmware fixing these CVEs between August and September 2024. These vulnerabilities are complex, hard to exploit, and affect a wide selection of hardware. Draytek likely had to rewrite large amounts of code to mitigate them fully and then there would have been extensive testing before public release.

Maintenance

It is VITALLY IMPORTANT that service providers maintain their Draytek Hardware with the latest firmware. GEN patch all our managed routers within the first 48 hours of a firmware release that contains security fixes to ensure the stability of our base, but not everyone does this judging by the support cases hitting the HelpDesk recently. PLEASE keep your firmware up to date, it only takes a few minutes and can save hours of downtime.

Technical Support

If you are experiencing issues and need assistance urgently, visit the HelpDesk and we will help. It isn't free, but it's professional, fast and efficient.


             9 Votes  
100% Human Generated

Comments (2)

Ian Walker · 2025-03-26 11:21 UTC
Thank you!

Alex Romanov · 2025-03-26 10:16 UTC
With GENs help we got our two 2866s back up and running again. We had to disconnect it from the internet, power it off and on, then firmware upgrade and after that we are back online.

×

--- This content is not legal or financial advice & Solely the opinions of the author ---


Index v1.038 Standard v1.114 Module v1.063   Copyright © 2025 GEN Partnership. All Rights Reserved, Content Policy, E&OE.   ^sales^  0115 933 9000  Privacy Notice   439 Current Users, 337 Hits