Log4Shell Vulnerability (CVE-2021-44228)
Released Date: 2021-12-14
DrayTek is aware of the recently disclosed security issue (CVE-2021-44228). After proceeding with verification, DrayTek confirms that the Vigor Routers, Access Ponts, Switches, VigorACS Central Management software, and MyVigor platform are not vulnerable to this “Log4Shell” exploit. You can feel safe using our DrayOS-based & Linux-based Vigor products, VigorACS Central Management Software, and the official website service. They are all with non-vulnerability to the "Log4Shell" exploit.
Affected Products
None.
Related Articles
Weekly Update 4 May 2022
Security Advisory OpenSSL vulnerability (CVE-2022-0778) Released Date: 2022-04-27 A Denial-Of-Service Vulnerability in OpenSSL (CVE-2022-0778) has been found recently. The BN_mod_sqrt() function in OpenSSL, which is used for parsing certificates ...
DrayTek Security Update 11 December 2025
WLAN Driver Vulnerabilities DrayTek has recently rolled out updated firmware to fix vulnerabilities in the WLAN drivers of chipsets used in several of its products. These vulnerabilities impact a broad range of chipset families found in devices such ...
Weekly Update 18 May 2022
Security Advisory OpenSSL vulnerability (CVE-2022-0778) Released Date: 2022-04-27 A Denial-Of-Service Vulnerability in OpenSSL (CVE-2022-0778) has been found recently. The BN_mod_sqrt() function in OpenSSL, which is used for parsing certificates ...
Weekly Update 3 April 2024
Security Advisory Information Disclosure Vulnerability (CVE-2024-23721) Release Date: 2024-03-27 A vulnerability related to the disclosure of sensitive information has been discovered, potentially allowing an unauthenticated attacker to retrieve the ...
Weekly Update 22 April 2020
Security Advisory Vigor3900 / Vigor2960 / Vigor300BStack-based buffer overflow Vulnerability (CVE-2020-10823 ~ CVE-2020-10828) This is a critical upgrade. You should upgrade affected VigorRouters as soon as possible to firmware v1.5.1 or later to ...