PT-2025-31818 · Draytek · Draytek Ap912C +2

Published

2025-08-04

·

Updated

2025-08-04

·

CVE-2025-44643

CVSS v3.1
8.6
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

Name of the Vulnerable Software and Affected Versions:

Draytek AP903 versions 1.4.18

Draytek AP912C version 1.4.9

Draytek AP918R version 1.4.9

Description:

The Draytek products are susceptible to insecure configurations due to hardcoded weak passwords within configuration files. Specifically, a weak password is set for the secret field in the `clients.conf` file related to FreeRadius, and the password property in the `ripd.conf` file. An attacker with network access could exploit this to gain unauthorized control over the routing daemon, potentially altering network routes or intercepting traffic.

Recommendations:

Draytek AP903 version 1.4.18: Change the hardcoded password in the `clients.conf` file and the `ripd.conf` file.

Draytek AP912C version 1.4.9: Change the hardcoded password in the `clients.conf` file and the `ripd.conf` file.

Draytek AP918R version 1.4.9: Change the hardcoded password in the `clients.conf` file and the `ripd.conf` file.

Fix

Incorrect Default Permissions

Using Hardcoded Credentials

Weakness Enumeration

Related Identifiers

CVE-2025-44643

Affected Products

Draytek Ap903
Draytek Ap912C
Draytek Ap918R