Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore advanced exploitation techniques for Draytek routers in this 35-minute conference talk that reveals two critical unauthenticated remote code execution vulnerabilities. Learn about CVE-2024-51138, a buffer overflow in STUN CGI handling, and CVE-2024-51139, an integer overflow in CGI parsing, discovered by security researchers Gaston Aznarez and Octavio Gianatiempo from Faraday. Discover how these vulnerabilities can be chained with previously disclosed persistence techniques to achieve complete device takeover and backdoor installation from the internet. Examine the in-depth technical analysis of these edge device vulnerabilities, witness live exploitation demonstrations, and understand the full end-to-end attack chain. Investigate the potential connection between these vulnerabilities and the mass Draytek reboot incidents of March 2025, suggesting real-world exploitation may already be occurring. Gain valuable insights into embedded device security research methodologies, the importance of transparency in vulnerability disclosure, and the critical role of specialized tooling like the Draytek Arsenal framework for firmware analysis. Build upon the speakers' previous research on backdooring Draytek devices and understand why these widely deployed edge devices remain high-value targets for attackers across thousands of organizations worldwide.
Syllabus
The Missing Link: Draytek’s New RCEs Complete the Chain - Gaston AznarezOctavio Gianatiempo
Taught by
Ekoparty Security Conference