Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.
References
Link Resource
https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2023-06-01T00:00:00

Updated: 2023-06-01T00:00:00

Reserved: 2023-05-22T00:00:00


Link: CVE-2023-33778

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-06-01T04:15:10.313

Modified: 2023-06-09T18:26:41.557


Link: CVE-2023-33778

JSON object: View

cve-icon Redhat Information

No data.

CWE