HomeVulnerabilityZyxel warns of crucial RCE flaw affecting over a dozen routers

Zyxel warns of crucial RCE flaw affecting over a dozen routers

Taiwan networking supplier Zyxel has launched security updates to deal with a crucial vulnerability affecting over a dozen router fashions that may permit unauthenticated attackers to realize distant command execution on unpatched gadgets.

Tracked as CVE-2025-13942, this command injection security flaw was discovered within the UPnP operate of Zyxel 4G LTE/5G NR CPE, DSL/Ethernet CPE, Fiber ONTs, and wi-fi extenders.

Zyxel says that unauthenticated distant attackers can exploit it to execute working system (OS) instructions on an affected machine utilizing maliciously crafted UPnP SOAP requests.

Wiz

Nevertheless, CVE-2025-13942 assaults will possible be extra restricted than the severity ranking suggests, as profitable exploitation requires UPnP and WAN entry to be enabled, with the latter disabled by default.

“It is very important notice that WAN entry is disabled by default on these gadgets, and the assault might be carried out remotely provided that each WAN entry and the weak UPnP operate have been enabled,” Zyxel stated. “Customers are strongly suggested to put in the patches to keep up optimum safety.”

See also  Development Micro fixes endpoint safety zero-day utilized in assaults

On Tuesday, Zyxel additionally patched two high-severity post-authentication command-injection vulnerabilities (CVE-2025-13943 and CVE-2026-1459) that permit risk actors to execute OS instructions utilizing compromised credentials.

Web security watchdog Shadowserver at present tracks practically 120,000 Web-exposed Zyxel gadgets, together with over 76,000 routers.

Internet-exposed Zyxel devices
Web-exposed Zyxel gadgets (Shadowserver)

​Zyxel gadgets are sometimes focused in assaults since they’re supplied by many web service suppliers worldwide because the default out-of-the-box gear when activating a brand new web service contract.

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) is at present monitoring 12 Zyxel vulnerabilitiesimpacting the corporate’s routers, firewalls, and NAS gadgets which were or are nonetheless actively exploited within the wild.

Earlier this month, Zyxel warned that it has no plans to patch a pair of zero-day security vulnerabilities (CVE-2024-40891 and CVE-2024-40891) which can be actively exploited in assaults and have an effect on end-of-life routers nonetheless obtainable on the market on-line. As an alternative, the corporate “strongly” suggested clients to interchange their routers with newer merchandise whose firmware has already been patched.

See also  Crucial Vulnerabilities Uncovered in Open Supply CasaOS Cloud Software program

“VMG1312-B10A, VMG1312-B10B, VMG1312-B10E, VMG3312-B10A, VMG3313-B10A, VMG3926-B10B, VMG4325-B10A, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, SBG3300, and SBG3500, are legacy merchandise which have reached end-of-life (EOL) for years,” stated Zyxel. “Due to this fact, we strongly suggest that customers change them with newer-generation merchandise for optimum safety.”

Zyxel claims that greater than 1 million companies use its networking merchandise throughout 150 markets.

tines

Fashionable IT infrastructure strikes quicker than handbook workflows can deal with.

On this new Tines information, learn the way your workforce can cut back hidden handbook delays, enhance reliability by automated response, and construct and scale clever workflows on high of instruments you already use.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular