Your router may be at risk of being hijacked. If you’re one of the close to 1 million people who the affected DrayTek routers, you need to update your firmware right this second.
A vulnerability in the firmware could allow a crook to route your traffic to the fake sites of their choosing and steal your information or trick you into downloading malware onto your device.
You can click on this link to go to DrayTek’s site and find the latest update for your router.
DrayTek also says you should check your router settings to make sure you DNS hasn’t been rerouted.
Check your DNS and DHCP settings on your router. If you have a router supporting multiple LAN subnets, check settings for each subnet. Your DNS settings should be either blank, set to the correct DNS server addresses from your ISP or DNS server addresses of a server which you have deliberately set (e.g. Google 188.8.131.52). A known rogue DNS server is 184.108.40.206 – if you see that, your router has been changed.
In the case of DHCP, the DHCP server may be disabled, which will typically cause errors on your LAN as devices fail to be issued with IP addresses so the problem is more obvious.
If it looks like your router has been compromised, you can click here to follow DrayTek’s instructions on how to fix the issue.