Expired

Security Advisory: WLAN Driver Vulnerabilities

Expired
10th December 2025

Models Affected: See table below


Priority: Critical

Action Required: Update to latest firmware where available. 

Our WLAN chipset provider has released security patches affecting a wide range of chipset families commonly used in devices such as smartphones, tables, smart speakers, wireless access points, and wireless routers. Since several DrayTek products incorporate these chipset families, we have promptly issues firmware updates to incorporate the updated W:AM driver across the impacted models.
The CVEs updates relate to CVE-2025-20710~20711, CVE-2025-20715~20716, CVE-2025-20718~20720, CVE-2025-20720, CVE-2025-20724, CVE-2025-20729, and CVE-2025-20731~20739. It is recommended to upgrade the firmware as soon as possible.

Although we are not aware of any reports of these vulnerabilities being exploited in the wild, we strongly recommend upgrading to the firmware versions listed below. If upgrading is not immediately possible, consider disabling WLAN functionality or isolating the device from the rest of the network as a temporary precaution.

Affected Products

Model Firmware Version Due
Vigor C410ax 5.3.5 Released
Vigor C510ax 5.3.5 Released
Vigor 2762n 3.9.9.5 Released
Vigor 2136ax 5.3.5 Released
Vigor 2620Ln 3.9.9.6 Released
Vigor 2763ac 4.5.2 Released
Vigor 2765ac / Vigor 2765Vac 4.5.2 Released
Vigor 2766ac / Vigor 2766Vac 4.5.2 Released
Vigor 2865ac / Vigor 2865Vac / Vigor 2865Lac 4.5.2 Released
Vigor 2866ac / Vigor 2866Vac / Vigor 2866Lac 4.5.2 Released
Vigor 2927ac / Vigor 2927Lac  4.5.1.1 Released
VigorAP 903 1.4.20 Released