CVE-2025-44643 – Draytek AP Series Insecure Permissions Weak Password Vulnerability

The following table lists the changes that have been made to the
CVE-2025-44643 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • CVE Modified
    by [email protected]

    Aug. 04, 2025

    Action Type Old Value New Value
    Changed Description Certain Draytek products are affected by Insecure Permissions. This affects AP903 v1.4.18 and AP912C v1.4.9 and AP918R v1.4.9. The setting of the secret field in the FreeRadius-related clients.conf configuration file sets a hardcoded weak password, posing a security risk. Certain Draytek products are affected by Insecure Configuration. This affects AP903 v1.4.18 and AP912C v1.4.9 and AP918R v1.4.9. The setting of the password property in the ripd.conf configuration file sets a hardcoded weak password, posing a security risk. An attacker with network access could exploit this to gain unauthorized control over the routing daemon, potentially altering network routes or intercepting traffic.
  • New CVE Received
    by [email protected]

    Aug. 04, 2025

    Action Type Old Value New Value
    Added Description Certain Draytek products are affected by Insecure Permissions. This affects AP903 v1.4.18 and AP912C v1.4.9 and AP918R v1.4.9. The setting of the secret field in the FreeRadius-related clients.conf configuration file sets a hardcoded weak password, posing a security risk.
    Added Reference http://draytek.com
    Added Reference https://www.notion.so/Misconfiguration-in-Draytek-AP903-23a54a1113e780aca7f2d21dbdab9db8
  • CVE Modified
    by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Aug. 04, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
    Added CWE CWE-798
    Added CWE CWE-276
Share the Post:

Related Posts