Tech »  Topic »  DrayOS Router Flaw Allows Remote Code Execution by Attackers

DrayOS Router Flaw Allows Remote Code Execution by Attackers


A critical vulnerability affecting DrayOS routers could let unauthenticated attackers execute code remotely.

Discovered on July 22 by Pierre-Yves Maes of ChapsVision, the flaw stems from the use of an uninitialized variable in the Web User Interface (WebUI).

Crafting special HTTP or HTTPS requests to the WebUI triggers memory corruption, potentially crashing the device or allowing remote code execution in specific scenarios.

Impact and Exploitation

The weakness requires no valid credentials and can be exploited by any attacker with network access to the router’s WebUI.

While routers are typically shielded from wide-area-network (WAN) threats if WebUI and SSL VPN services are disabled or protected via Access Control Lists (ACLs), local attackers remain at risk.

CVE ID Vulnerability Impact Exploit Prerequisites
CVE-2025-10547 Use of uninitialized variable in WebUI logic Remote code execution Unauthenticated HTTP/HTTPS to WebUI

On some models, LAN-side VLANs and ACLs offer additional control over WebUI access ...


Copyright of this story solely belongs to gbhackers . To see the full text click HERE