We have launched the new version of the DrayTek website, and this content is no longer being maintained.
You will find more information on our new site; however, we will keep this page for a few months.

How are DrayTek wireless products affected by the WPA2 KRACK vulnerability?


When DrayTek wireless products, such as wireless routers and access points, are used as wireless base stations, they are not affected by the KRACK (Key Reinstallation AttaCK) vulnerability; therefore patches or updates are not required.

However, other devices connecting to DrayTek products and functioning as wireless clients (e.g., mobile phones, tablets, laptops, and etc.,) could be vulnerable. You should check with device vendors to determine if updates are needed.

When DrayTek products are used as wireless clients and access to the Internet with universal repeater or wireless WAN modes, the wireless traffic is susceptible to interception as the router or access point is acting as a wireless client. DrayTek will be releasing firmware updates to address the issue starting next week.

Routers with wireless WAN support, and their corresponding fixed firmware versions:

  • Vigor2862 wireless series, version 3.8.7
  • Vigor2860 wireless series, version
  • Vigor2830v2 wireless series, version 3.8.5
  • Vigor2925 wireless series, version 3.8.5
  • Vigor2912 wireless series, version 3.8.5
  • Vigor2120 wireless series, version 3.8.5

*Please note that routers that are not listed above are not affected by the KRACK vulnerability.


Access points with universal repeater or Station-Infrastructure support, and their corresponding fixed firmware versions:

  • AP910C, version
  • AP900, version
  • AP902, version 1.2.3
  • AP810, version 1.2.3
  • AP710, version 1.2.3
  • AP800, version