Earn Your Business Degree, Tuition-Free, 100% Online!
Google AI Professional Certificate - Learn AI Skills That Get You Hired
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
This Black Hat conference talk explores how security researchers discovered Remote Code Execution vulnerabilities in DrayTek networking equipment before malicious actors could exploit them. Learn about the technical analysis of DrayTek devices—which include routers, VoIP gateways, firewalls, WiFi access points, and VPN concentrators—that share core software components and therefore common vulnerabilities. Discover how researchers Stanislav Dashevskyi and Francesco La Spina from Forescout Technologies not only achieved remote code execution on the latest VPN concentrator model but also found ways to escape the emulated environment to gain full device control. The presentation details vulnerabilities affecting DrayTek's entire product line (now patched) and discusses the potential impact had these security flaws been discovered by threat actors, particularly relevant given Chinese threat actors' previous targeting of these devices since 2018.
Syllabus
When (Remote) Shells Fall Into The Same Hole: Rooting DrayTek Routers Before Attackers Can
Taught by
Black Hat