Certain Draytek products are affected by Insecure Configuration. This affects AP903 v1.4.18 and AP912C v1.4.9 and AP918R v1.4.9. The setting of the password property in the ripd.conf configuration file sets a hardcoded weak password, posing a security risk. An attacker with network access could exploit this to gain unauthorized control over the routing daemon, potentially altering network routes or intercepting traffic.
History

Tue, 05 Aug 2025 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Draytek
Draytek ap903
Draytek ap912c
Draytek ap918r
Vendors & Products Draytek
Draytek ap903
Draytek ap912c
Draytek ap918r

Mon, 04 Aug 2025 16:15:00 +0000

Type Values Removed Values Added
Description Certain Draytek products are affected by Insecure Permissions. This affects AP903 v1.4.18 and AP912C v1.4.9 and AP918R v1.4.9. The setting of the secret field in the FreeRadius-related clients.conf configuration file sets a hardcoded weak password, posing a security risk. Certain Draytek products are affected by Insecure Configuration. This affects AP903 v1.4.18 and AP912C v1.4.9 and AP918R v1.4.9. The setting of the password property in the ripd.conf configuration file sets a hardcoded weak password, posing a security risk. An attacker with network access could exploit this to gain unauthorized control over the routing daemon, potentially altering network routes or intercepting traffic.

Mon, 04 Aug 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-276
CWE-798
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 04 Aug 2025 14:45:00 +0000

Type Values Removed Values Added
Description Certain Draytek products are affected by Insecure Permissions. This affects AP903 v1.4.18 and AP912C v1.4.9 and AP918R v1.4.9. The setting of the secret field in the FreeRadius-related clients.conf configuration file sets a hardcoded weak password, posing a security risk.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-08-04T00:00:00.000Z

Updated: 2025-08-04T16:05:25.238Z

Reserved: 2025-04-22T00:00:00.000Z

Link: CVE-2025-44643

cve-icon Vulnrichment

Updated: 2025-08-04T15:01:09.644Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-04T15:15:32.197

Modified: 2025-08-05T14:34:17.327

Link: CVE-2025-44643

cve-icon Redhat

No data.