DrayTek’s Router Ruckus: Patch That RCE Bug Before It Crashes Your Network!
DrayTek has patched an RCE vulnerability in its routers. CVE-2025-10547 can be exploited via crafted requests to the web interface, leading to memory corruption. Though remote access safeguards exist, local network attackers could still strike. DrayTek urges users to update firmware, as these routers are prime hacker bait.

Hot Take:
Ah, routers—those unsung heroes of internet connectivity that we all ignore until they decide to throw a tantrum and leave us disconnected. DrayTek’s latest vulnerability sounds like the router equivalent of a mid-life crisis, complete with memory corruption and crashing. The upside? At least it’s not buying a red sports car. Instead, it’s getting a firmware update. Who said routers can’t have a glow-up?
Key Points:
– DrayTek has patched an unauthenticated remote code execution (RCE) vulnerability in DrayOS routers, named CVE-2025-10547.
– The flaw can be exploited via crafted HTTP or HTTPS requests sent to the router’s web user interface.
– Successful attacks may lead to memory corruption, system crashes, or remote code execution.
– Remote access settings and Access Control Lists (ACLs) can help mitigate the risk.
– DrayTek has released firmware updates for 35 router models, urging users to update.