Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-23505 | Certain Draytek products are affected by Insecure Configuration. This affects AP903 v1.4.18 and AP912C v1.4.9 and AP918R v1.4.9. The setting of the password property in the ripd.conf configuration file sets a hardcoded weak password, posing a security risk. An attacker with network access could exploit this to gain unauthorized control over the routing daemon, potentially altering network routes or intercepting traffic. |
Tue, 05 Aug 2025 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Draytek
Draytek ap903 Draytek ap912c Draytek ap918r |
|
| Vendors & Products |
Draytek
Draytek ap903 Draytek ap912c Draytek ap918r |
Mon, 04 Aug 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Certain Draytek products are affected by Insecure Permissions. This affects AP903 v1.4.18 and AP912C v1.4.9 and AP918R v1.4.9. The setting of the secret field in the FreeRadius-related clients.conf configuration file sets a hardcoded weak password, posing a security risk. | Certain Draytek products are affected by Insecure Configuration. This affects AP903 v1.4.18 and AP912C v1.4.9 and AP918R v1.4.9. The setting of the password property in the ripd.conf configuration file sets a hardcoded weak password, posing a security risk. An attacker with network access could exploit this to gain unauthorized control over the routing daemon, potentially altering network routes or intercepting traffic. |
Mon, 04 Aug 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-276 CWE-798 |
|
| Metrics |
cvssV3_1
|
Mon, 04 Aug 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Certain Draytek products are affected by Insecure Permissions. This affects AP903 v1.4.18 and AP912C v1.4.9 and AP918R v1.4.9. The setting of the secret field in the FreeRadius-related clients.conf configuration file sets a hardcoded weak password, posing a security risk. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-08-04T16:05:25.238Z
Reserved: 2025-04-22T00:00:00.000Z
Link: CVE-2025-44643
Updated: 2025-08-04T15:01:09.644Z
Status : Deferred
Published: 2025-08-04T15:15:32.197
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-44643
No data.
OpenCVE Enrichment
Updated: 2025-08-05T11:56:33Z
EUVD