According to Draytek on their website,
When DrayTek wireless products, such as wireless routers and access points, are used as wireless base stations, they are not affected by the KRACK (Key Reinstallation AttaCK) vulnerability; therefore patches or updates are not required.
I found this quite surprising. There is no further information explaining how they reached this conclusion, but at this stage I have to be inclined to believe it - it surely would have be signed off by various legal and engineering teams.
My question is, how would this be possible? Had they already discovered the flaw and mitigated against it (which would raise questions about them not publicly disclosing it)? Did they simply not implement the WPA2 standard correctly and this is happy coincidence?
I appreciate that it's possible that no one can conclusively answer this without inside information, but it will be interesting to see if more vendors claim not to be affected.