Security Advisory: Use of Uninitialized Variable Vulnerabilities (CVE-2025-10547)
Expired3rd October 2025
Models Affected: See table below
Priority: Critical
Action Required: Ensure ACL is enabled in System Maintenance. Disable SSL VPN. Disable Remote Management. Update to latest firmware where available
On July 22 2025, a security vulnerability was identified in DrayOS routers. The vulnerability can be triggered when unauthenticated remote attackers send crafted HTTP or HTTPS requests to the device's Web User Interface (WebUI). Successful exploitation may cause memory corruption and a system crash, with the potential in certain circumstances could allow remote code execution.
Routers are shielded from WAN-based attacks if remote access to the WebUI and SSL VPN services is disabled, or if Access Control Lists (ACLs) are properly configured. Nevertheless, an attacker with access to the local network could still exploit the vulnerability via the WebUI. Local access to the WebUI can be controlled on some models using LAN side VLANs and ACLs. To ensure full protection, we strongly recommend upgrading the firmware to the minimum version specified below:
Affected Products
Model | Firmware Version | Due |
Vigor 2962 | 4.4.3.6 | Released |
Vigor 2962 | 4.4.5.1 | Released |
Vigor 3910 | 4.4.3.6 | Released |
Vigor 3910 | 4.4.5.1 | Released |
Vigor 3912 | 4.4.3.6 | Released |
Vigor 3912 | 4.4.5.1 | Released |
Vigor 2135 | 4.5.1 | Released |
Vigor 2763 | 4.5.1 | Released |
Vigor 2765 | 4.5.1 | Released |
Vigor 2766 | 4.5.1 | Released |
Vigor 2865 | 4.5.1 | Released |
Vigor 2866 | 4.5.1 | Released |
Vigor 2927 | 4.5.1 | Released |
Vigor 2862 | 3.9.9.12 | Released |
Vigor 2926 | 3.9.9.12 | Released |
Vigor 2952 | 3.9.8.8 | Released |
Vigor 3220 | 3.9.8.8 | Released |
Vigor 2860 | 3.9.8.6 | Released |
Vigor 2925 | 3.9.8.6 | Released |
Vigor 2762 | 3.9.9.4 | Released |
Vigor 2832 | 3.9.9.4 | Released |
Vigor 2620Ln | 3.9.9.5 | Released |
Recognising Contribution
We extend our sincere appreciation to Pierre-Yves MAES for his responsible disclosure and timely reporting of this vulnerability, which has contributed to strengthening out security measures.