{"id":63183,"date":"2025-08-09T01:30:43","date_gmt":"2025-08-09T01:30:43","guid":{"rendered":""},"modified":"2025-08-31T14:15:59","modified_gmt":"2025-08-31T20:15:59","slug":"cve-2025-44643-insecure-configuration-in-draytek-products","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-44643-insecure-configuration-in-draytek-products\/","title":{"rendered":"<strong>CVE-2025-44643: Insecure Configuration in DrayTek Products<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>A significant security vulnerability, CVE-2025-44643, has been identified in certain products from DrayTek, a manufacturer of network equipment. The vulnerability arises from an insecure configuration in the ripd.conf configuration file that sets a weak hardcoded password. This has been found to impact DrayTek&#8217;s AP903 v1.4.18, AP912C v1.4.9, and AP918R v1.4.9 products. This issue is of grave concern as any attacker with network <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-4855-unauthorized-access-vulnerability-in-support-board-plugin-for-wordpress\/\"  data-wpil-monitor-id=\"70987\">access could exploit this loophole to gain unauthorized<\/a> control over the routing daemon, potentially altering network routes or intercepting traffic.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-44643<br \/>\nSeverity: High (8.6 CVSS Severity Score)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: Unauthorized control over the routing daemon, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-8040-memory-safety-bugs-causing-potential-system-compromise-in-firefox-and-thunderbird\/\"  data-wpil-monitor-id=\"71305\">potential system compromise<\/a>, and data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-275606802\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>DrayTek AP903 | v1.4.18<br \/>\nDrayTek AP912C | v1.4.9<br \/>\nDrayTek AP918R | v1.4.9<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The insecure <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-52239-arbitrary-file-upload-vulnerability-in-zkeacms-v4-1\/\"  data-wpil-monitor-id=\"74587\">configuration<\/a> vulnerability exploits the setting of the password property in the ripd.conf configuration file. This file sets a <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-51536-critical-hardcoded-administrator-password-vulnerability-in-ai-openatlas\/\"  data-wpil-monitor-id=\"76743\">hardcoded weak password<\/a>, thereby posing a security risk. An <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-42959-unauthenticated-replay-attack-exploiting-hmac-reuse\/\"  data-wpil-monitor-id=\"71304\">attacker with network access can leverage this vulnerability by exploiting<\/a> the weak password to gain unauthorized access to the routing daemon. Once the attacker gains control over the routing daemon, they can manipulate network routes or intercept network traffic, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-43192-critical-configuration-issue-in-macos-allowing-potential-system-compromise\/\"  data-wpil-monitor-id=\"71410\">potentially leading to system<\/a> compromise and data leakage.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-2409651025\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>A conceptual example of how this vulnerability might be <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-52950-unauthorized-access-exploitation-in-juniper-networks-security-director\/\"  data-wpil-monitor-id=\"71356\">exploited could be an attacker using a network<\/a> scanning tool to identify devices with the vulnerable DrayTek versions. Once identified, they could utilize the hardcoded weak password to gain <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-6505-unauthorized-access-and-impersonation-vulnerability-in-progress-software-s-hybrid-data-pipeline-server\/\"  data-wpil-monitor-id=\"71409\">unauthorized access<\/a>. A pseudo command might look like this:<\/p>\n<pre><code class=\"\" data-line=\"\">nmap -sV --script=vuln target_network\nssh root@target_device_ip\npassword: hardcoded_weak_password\n# Now the attacker has control of the routing daemon<\/code><\/pre>\n<p>It should be noted that the above is a hypothetical example and does not represent actual exploit code.<\/p>\n<p><strong>Mitigation Guidance<\/strong><\/p>\n<p>DrayTek users are advised to apply the vendor patch immediately to mitigate this vulnerability. As a temporary measure, users can also use a Web Application Firewall (WAF) or an Intrusion Detection System (IDS) to detect and prevent potential attacks. Regularly updating and patching network devices and refraining from using hardcoded passwords are also recommended.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview A significant security vulnerability, CVE-2025-44643, has been identified in certain products from DrayTek, a manufacturer of network equipment. The vulnerability arises from an insecure configuration in the ripd.conf configuration file that sets a weak hardcoded password. This has been found to impact DrayTek&#8217;s AP903 v1.4.18, AP912C v1.4.9, and AP918R v1.4.9 products. This issue is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-63183","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/63183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=63183"}],"version-history":[{"count":6,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/63183\/revisions"}],"predecessor-version":[{"id":69166,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/63183\/revisions\/69166"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=63183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=63183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=63183"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=63183"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=63183"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=63183"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=63183"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=63183"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=63183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}