CVE-2023-33778
Severity CVSS v4.0:
Pending analysis
Type:
CWE-798
Use of Hard-coded Credentials
Publication date:
01/06/2023
Last modified:
09/01/2025
Description
Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:draytek:myvigor:*:*:*:*:*:*:*:* | 2.3.2 (excluding) | |
| cpe:2.3:o:draytek:vigorswitch_pq2200xb_firmware:*:*:*:*:*:*:*:* | 2.6.7 (excluding) | |
| cpe:2.3:h:draytek:vigorswitch_pq2200xb:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:draytek:vigorswitch_pq2121x_firmware:*:*:*:*:*:*:*:* | 2.6.7 (excluding) | |
| cpe:2.3:h:draytek:vigorswitch_pq2121x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:draytek:vigorswitch_p2540xs_firmware:*:*:*:*:*:*:*:* | 2.6.7 (excluding) | |
| cpe:2.3:h:draytek:vigorswitch_p2540xs:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:draytek:vigorswitch_p2280x_firmware:*:*:*:*:*:*:*:* | 2.6.7 (excluding) | |
| cpe:2.3:h:draytek:vigorswitch_p2280x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:draytek:vigorswitch_p2100_firmware:*:*:*:*:*:*:*:* | 2.6.7 (excluding) | |
| cpe:2.3:h:draytek:vigorswitch_p2100:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:draytek:vigorswitch_q2200x_firmware:*:*:*:*:*:*:*:* | 2.6.7 (excluding) | |
| cpe:2.3:h:draytek:vigorswitch_q2200x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:draytek:vigorswitch_q2121x_firmware:*:*:*:*:*:*:*:* | 2.6.7 (excluding) | |
| cpe:2.3:h:draytek:vigorswitch_q2121x:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



