Log4Shell Vulnerability (CVE-2021-44228)
Released Date: 2021-12-14
DrayTek is aware of the recently disclosed security issue (CVE-2021-44228). After proceeding with verification, DrayTek confirms that the Vigor Routers, Access Ponts, Switches, VigorACS Central Management software, and MyVigor platform are not vulnerable to this “Log4Shell” exploit. You can feel safe using our DrayOS-based & Linux-based Vigor products, VigorACS Central Management Software, and the official website service. They are all with non-vulnerability to the "Log4Shell" exploit.
Affected Products
None.
Related Articles
Weekly Update 4 May 2022
Security Advisory OpenSSL vulnerability (CVE-2022-0778) Released Date: 2022-04-27 A Denial-Of-Service Vulnerability in OpenSSL (CVE-2022-0778) has been found recently. The BN_mod_sqrt() function in OpenSSL, which is used for parsing certificates ...
Weekly Update 18 May 2022
Security Advisory OpenSSL vulnerability (CVE-2022-0778) Released Date: 2022-04-27 A Denial-Of-Service Vulnerability in OpenSSL (CVE-2022-0778) has been found recently. The BN_mod_sqrt() function in OpenSSL, which is used for parsing certificates ...
Weekly Update 3 April 2024
Security Advisory Information Disclosure Vulnerability (CVE-2024-23721) Release Date: 2024-03-27 A vulnerability related to the disclosure of sensitive information has been discovered, potentially allowing an unauthenticated attacker to retrieve the ...
Weekly Update 22 April 2020
Security Advisory Vigor3900 / Vigor2960 / Vigor300BStack-based buffer overflow Vulnerability (CVE-2020-10823 ~ CVE-2020-10828) This is a critical upgrade. You should upgrade affected VigorRouters as soon as possible to firmware v1.5.1 or later to ...
Weekly Update 13 February 2020
Security Advisory Vigor3900 / Vigor2960 / Vigor300B Router Web Management Page Vulnerability (CVE-2020-8515) A vulnerability has been discovered that allows attackers to gain unauthorised remote access to the router management page. This has been ...