Software catalogue for DrayTek Corp.

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER

Main › Vulnerability Database › DrayTek Corp.

Software catalogue for DrayTek Corp.

DrayTek firmware Vigor 1000B Vigor 120 Vigor 122 Vigor 130 Vigor 165 Vigor 166 Vigor 167 Vigor 200n Vigor 2120
Vigor 2132 Vigor 2133 Vigor 2133n Vigor 2135 Vigor 2135ac Vigor 2135FVac Vigor 2135Vac Vigor 2136ax Vigor 2620 Vigor 2620Ln


Showing elements 1 - 20 out of 121

  • Previous
  • 1
  • 2
  • More pages
  • 6
  • Next

Latest security bulletins

Secuity bulletin Severity Status Published
SB2026011996: Multiple DrayTek routers update for WLAN driver Low
Patched
19.01.2026
SB2025100409: Remote code execution in multiple DrayOS routers Critical
Patched
04.10.2025
SB2025040837: Multiple WLAN driver vulnerabilities in DrayTek routers High
Patched
08.04.2025
SB2025040126: Multiple vulnerabilities in Draytek routers High
Patched
01.04.2025
SB2025040124: Multiple vulnerabilities in Draytek routers High
Patched
01.04.2025
SB2024100306: Multiple vulnerabilities in DrayTek products Critical
Patched
03.10.2024
SB2022080516: Remote code execution in DrayTek Vigor routers High
Patched
05.08.2022
SB2021101348: Multiple path traversal vulnerabilities in DrayTek VigorConnect High
Patched Exploited
13.10.2021
SB2020062702: Multiple vulnerabilities in DrayTek Vigor3900, Vigor2960, and Vigor300B High
Patched Exploited
27.06.2020
SB2020021407: Remote code execution in Draytek Vigor 2960, 3900 and 300B Critical
Patched Exploited
14.02.2020

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or