CVE-2025-10547

Vigor · Vigor Routers running DrayOS

A high-severity vulnerability has been identified in multiple Vigor Routers running the DrayOS operating system.

Executive summary

A high-severity vulnerability has been identified in multiple Vigor Routers running the DrayOS operating system. This flaw, caused by an uninitialized variable, can be exploited by a remote attacker to achieve memory corruption and execute arbitrary code, effectively taking full control of the affected network appliance. Successful exploitation could lead to a complete network compromise, data interception, and service disruption.

Vulnerability

The vulnerability exists within the component responsible for processing HTTP CGI request arguments on the device's web management interface. Due to an uninitialized variable, the software fails to properly allocate or assign a default value to a memory location. A remote, unauthenticated attacker can craft a specialized HTTP request that manipulates this uninitialized variable, leading to a memory corruption condition which can be leveraged to execute arbitrary code with the privileges of the affected service, resulting in a full compromise of the router.

Business impact

This vulnerability is rated as high severity with a CVSS score of 8.8. A successful exploit would grant an attacker complete control over the affected router, which is a critical network infrastructure component. The potential consequences include interception of all network traffic passing through the device, unauthorized access to internal network resources, deployment of malware, disruption of internet connectivity, and using the compromised device as a pivot point for further attacks against the organization. The risk to the business includes significant operational downtime, data breaches, and reputational damage.

Remediation

Immediate Action: The primary remediation is to apply the security updates provided by the vendor to all affected Vigor routers immediately. After patching, organizations should review web management access logs for any signs of anomalous or malicious requests that may indicate prior exploitation attempts.

Proactive Monitoring: Implement enhanced monitoring of network traffic to and from the router's management interface. Security teams should look for unusually crafted or malformed HTTP CGI requests, unexpected system reboots or crashes, and any anomalous outbound connections originating from the router itself, which could indicate a successful compromise.

Compensating Controls: If immediate patching is not feasible, organizations should implement compensating controls. Restrict access to the router's web management interface to a trusted, internal management network only. If external access is required, ensure it is protected by a VPN with multi-factor authentication. A Web Application Firewall (WAF) can also be configured to inspect and block malicious HTTP requests targeting the vulnerable component.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 8.8) and the critical role of routers in network security, we strongly recommend that organizations prioritize the immediate patching of all affected Vigor routers. While this CVE is not currently listed on the CISA KEV catalog, its potential for complete network compromise warrants urgent attention. Organizations should assume that threat actors will develop an exploit and should act proactively to mitigate this significant risk before it is actively exploited.