The Register: Hm, why are so many DrayTek routers stuck in a bootloop?

Source URL: https://www.theregister.com/2025/03/25/draytek_routers_bootloop/
Source: The Register
Title: Hm, why are so many DrayTek routers stuck in a bootloop?

Feedly Summary: Time to update your firmware, if you can, to one with the security fixes, cough cough
DrayTek router owners in the UK and beyond had a pretty miserable weekend after some ISPs began to notice a lot of their customers’ gateways going offline.…

AI Summary and Description: Yes

Summary: DrayTek router owners faced significant issues as certain models experienced endless reboot cycles. This situation highlighted serious vulnerabilities in the routers’ firmware. Users were advised to upgrade their firmware and disable remote access to mitigate risks. The incident underscores critical concerns related to infrastructure security and the need for robust patch management in the face of emerging threats.

Detailed Description:

– **Incident Overview**: Many DrayTek routers began to malfunction, rebooting repeatedly, which affected users in the UK and beyond over the weekend. Service providers were alerted to the issues as customers reported their devices becoming inoperable.

– **Manufacturer Response**: DrayTek advised users to disconnect their routers from the internet and upgrade the firmware, recommending the use of TFTP for those who could not upgrade via the web interface.

– **Security Recommendations**:
– Users were urged to disable remote administrative access unless absolutely necessary.
– Implement access control lists (ACLs) and enable two-factor authentication (2FA) where possible.
– For devices that had not been patched, users were advised to disable remote access and SSL VPN services to reduce exposure to potential exploits.

– **Vulnerability Insight**: The problems appeared to correlate with unpatched vulnerabilities in DrayTek’s firmware, which could have allowed for buffer overflow attacks, leading to device crashes or malware execution. This highlights the importance of regular updates and rapid response to identified security weaknesses.

– **Context of Threats**: There is a documented connection to a broader issue of malware control, including historically reported Chinese operations leveraging botnets composed of infected devices, including those from DrayTek.

– **Broader Impact**: The malfunctioning routers impacted not only individual users but also several ISPs, raising alarms about the stability and security of their networks. Reports of similar issues were also noted in countries like Australia and throughout Asia, indicating a potentially widespread problem.

– **User Community Engagement**: Users were encouraged to share their experiences and details concerning model numbers and firmware versions, indicating the value of community feedback in troubleshooting and resolution efforts.

This incident serves as a critical reminder for security and compliance professionals of the ongoing vulnerabilities in infrastructure security, particularly concerning widely used hardware and the need for prompt updates and secure configurations to safeguard against exploitation.