It has been reported that some web-enabled devices, including some DrayTek routers, have been compromised. The report shows that it may be possible for an attacker to intercept or create an administration session and change DNS and/or other settings on the router.
DrayTek has now released new firmware that addresses this security vulnerability. The firmware can be downloaded from: https://www.draytek.com/en/download/firmware/.
To check if your router has been compromised, look at the DNS and DHCP settings on your router. If you have a router supporting multiple LAN subnets, check the settings for each subnet. Your DNS settings should be either blank, set to the correct DNS server addresses from your ISP or DNS server addresses of a server which you have set (e.g. Google 126.96.36.199).
If you see a rogue DNS server setting of 188.8.131.52 – it means that your router settings have been changed. In this case you can correct the changes or restore the router configuration from the last good known backup configuration.
Updated firmware with the security fix listed below:
- Vigor120, version 184.108.40.206
- Vigor122, version 220.127.116.11
- Vigor130, version 18.104.22.168
- VigorNIC 132, version 22.214.171.124
- Vigor2120 Series, version 126.96.36.199
- Vigor2132, version 188.8.131.52
- Vigor2133, version 184.108.40.206
- Vigor2760D, version 220.127.116.11
- Vigor2762, version 18.104.22.168
- Vigor2832, version 22.214.171.124
- Vigor2860, version 3.8.8
- Vigor2862, version 126.96.36.199
- Vigor2862B, version 188.8.131.52
- Vigor2912, version 184.108.40.206
- Vigor2925, version 220.127.116.11
- Vigor2926, version 18.104.22.168
- Vigor2952, version 22.214.171.124
- Vigor3220, version 126.96.36.199
- VigorBX2000, version 188.8.131.52
- VigorIPPBX2820, version 184.108.40.206
- VigorIPPBX3510, version 220.127.116.11
- Vigor2830nv2, version 18.104.22.168
- Vigor2820, version 22.214.171.124
- Vigor2710, version 126.96.36.199
- Vigro2110, version 188.8.131.52
- Vigro2830sb, version 184.108.40.206
- Vigor2850, version 220.127.116.11
- Vigor2920, version 18.104.22.168
Click here to download latest firmware.
How to activate and use DrayDDNS Service
This video introduces the DrayDDNS service. DrayDDNS can be used when your ISP gives you a dynamic IP address and it allows you to connect to the router remotely by using a domain name. The configuration steps in a DrayTek Vigor router are described to assist you to in setting up your own DrayDDNS account.
How to Find the Best Wi-Fi Channel by Using Vigor AP or your Mobile Phone
This video shows how to find the best Wi-Fi channel by using a Vigor Access Point (AP) or your mobile phone. Since Wi-Fi performance is related to the channel utilisation, the diagnostic steps shown in this video will help to find the least congested channel to use.
New Application Notes
How to configure firewall filter rules to allow VPN if default rule is set to block all traffic.
This application note shows how to configure the firewall in Vigor routers to allow required traffic over a VPN tunnel when the default firewall rule is set to block all traffic.
[tw_button icon=”” link=”http://www.i-helpdesk.com.au/index.php?/default_import/Knowledgebase/Article/View/750/5/how-to-configure-firewall-filter-rules-to-allow-vpn-if-default-rule-is-set-to-block-all-traffic” size=”medium” rounded=”false” style=”flat” hover=”default” color=”#000000″ target=”_blank”]Read more[/tw_button]
Smart VPN Client V4.3.4
- Allow the user to run SmartVPN Client and establish the VPN tunnel using Windows User Level Account. Note that the SmartVPN Client should be installed using Windows Admin Level Account first.
Click here to download