Security intelligence firm GreyNoise has identified the active exploitation of several DrayTek vulnerabilities, which could be linked to these mysterious reboots that began around March 22, 2025.
Users in the UK, Australia, Vietnam, Germany, and other countries have reported DrayTek routers across multiple model series intermittently losing connectivity and entering boot loops.
ISPs, including Gamma, Zen Internet, ICUK, and Andrews & Arnold in the United Kingdom, confirmed these disruptions, attributing them to attacks targeting unspecified vulnerabilities.
“The cause has been narrowed down to vulnerable firmware versions on DrayTek routers. If you are seeing broadband circuits exhibiting repeat short sessions, please upgrade the firmware to the latest version,” ICUK stated.
GreyNoise has documented in-the-wild exploitation attempts against three known DrayTek vulnerabilities over the past 45 days:
CVE-2020-8515: A remote code execution vulnerability affecting multiple DrayTek router models.
Stop attacks before they start, powered by a 97% precise neural Network to Detect Cyber Attacks
While no activity has been observed in the past 24 hours, 82 unique IP addresses were recorded exploiting this vulnerability in the past 30 days.
CVE-2021-20123 and CVE-2021-20124: Directory traversal vulnerabilities in DrayTek VigorConnect.
Both vulnerabilities have shown active exploitation within the last 24 hours, with 23 and 22 unique attacking IP addresses recorded, respectively.
The most targeted countries include Lithuania, the United States, and Singapore, according to GreyNoise data.
The impact has been substantial across multiple sectors. In Thu Duc, Ho Chi Minh City, an Internet café owner reported that since March 23, “the network has been intermittently unstable despite multiple device restarts.”
Another user in Ho Chi Minh City who uses a DrayTek Vigor 2925 noted that their “IP camera repeatedly lost connection,” and their router management page showed “uptime reset to zero every five minutes.”
DrayTek has published guidance for affected users, recommending immediate action: “The solution is to disconnect the WAN and then try to upgrade to the latest firmware.” Additional recommendations include:
This incident follows Forescout Technologies’ October 2024 findings that identified 14 previously unknown vulnerabilities in DrayTek routers, including one with the highest possible severity rating of 10.
Security researchers continue to monitor the situation, with GreyNoise tracking exploit attempts in real-time. Network administrators using DrayTek equipment are strongly advised to implement the recommended mitigations immediately.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
The post DrayTek Routers Vulnerability Exploited in the Wild – Possibly Links to Reboot Loop appeared first on Cyber Security News.
IO Interactive has published a portion of the opening mission from 007 First Light after…
Far in the distant future, long after the human race has spread itself among the…
The cybersecurity landscape in 2026 is defined by unprecedented sophistication. Threat actors are leveraging generative…
Have you noticed? You can’t spell ‘Edward Kenway’ without ‘wayward’. And the protagonist of Assassin’s…
Hands Over is a new multiplayer horror party game that takes some of your favorite…
Have you noticed? You can’t spell ‘Edward Kenway’ without ‘wayward’. And the protagonist of Assassin’s…
This website uses cookies.