DrayTek has recently fixed a serious security problem called CVE-2025-10547 that affects its DrayOS router series. This problem lets attackers take control of weak routers by sending specially made HTTP or HTTPS requests to the device's web interface. If they succeed, this can cause memory issues, crashes, or even let the attacker run harmful code from far away. Even though remote attacks from the internet are limited if the router's WebUI and SSL VPN features are turned off or if Access Control Lists (ACLs) are set up correctly, there is still a risk for those who have access to the local network. The root issue in the vulnerability lies in the fact that the web-based interface doesn't validate the input adequately, allowing malicious data to influence the system memory. Such routers are common among small businesses as well as technology-aware users due to their features. Hence, they pose an attractive target for attackers. There isn't any evidence available on the exploitation of this vulnerability in actual attacks so far, but DrayTek routers have become the target in the past. Previously, ransomware groups had exploited unknown weaknesses to compromise numerous entities. In order to reduce the risk, users are encouraged by DrayTek to quickly update their firmware. There are patches for 35 compromised Vigor routers. Remote access for the web administration should also be turned off along with ACLs being correctly set up for unauthorized traffic not being allowed. Isolation of the network using the LAN-side VLANs also aids in limiting access. These should all be completed to avoid possible attacks as well as keep the network secure.
The National Stock Exchange (NSE) faces an enormous volume of cyber threats, with estimates of up to 170 million attacks daily. To safeguard its operations, the exchange relies on ...
In August 2025, F5 Networks suffered a major security breach attributed to a sophisticated nation-state threat actor. The attackers infiltrated F5’s product development and engin...
Microsoft has confirmed that the September 2025 security updates for Windows Server 2025 are resulting in synchronization problems with Active Directory Domain Services (AD DS). It...