cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2025-0890,https://securityvulnerability.io/vulnerability/CVE-2025-0890,Insecure Default Credentials Affecting Zyxel DSL CPE Firmware,"The Zyxel VMG4325-B10A DSL CPE firmware is affected by a vulnerability due to insecure default credentials associated with the Telnet function. This flaw allows unauthorized access to the management interface when the provided default credentials are not modified by administrators. As a result, attackers could exploit this oversight to gain unauthorized control, potentially leading to further compromises in network security. It is crucial for users of this device to ensure that they update the credentials to enhance their device's security.",Zyxel,Vmg4325-b10a Firmware,9.8,CRITICAL,0.01,false,,false,false,false,,false,false,false,,2025-02-04T10:06:56.163Z,0 CVE-2024-40891,https://securityvulnerability.io/vulnerability/CVE-2024-40891,Command Injection Vulnerability in Zyxel DSL CPE Firmware,"A post-authentication command injection vulnerability exists in the management commands of Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615. This flaw allows an authenticated attacker to execute arbitrary operating system commands via Telnet, potentially compromising the security and integrity of the affected device.",Zyxel,Vmg4325-b10a Firmware,8.8,HIGH,0.01,false,,true,false,true,2025-02-04T21:22:52.000Z,false,true,true,2025-02-04T11:52:02.520Z,2025-02-04T10:02:48.018Z,5207 CVE-2024-40890,https://securityvulnerability.io/vulnerability/CVE-2024-40890,Command Injection Vulnerability in Zyxel Legacy DSL CPE,"A post-authentication command injection vulnerability exists in the CGI program of the legacy DSL CPE Zyxel VMG4325-B10A. By crafting a specific HTTP POST request, an authenticated attacker could execute arbitrary operating system commands on the affected device, potentially leading to unauthorized actions and significant security risks.",Zyxel,Vmg4325-b10a Firmware,8.8,HIGH,0.01,false,,false,false,false,,false,false,false,,2025-02-04T09:55:38.908Z,0 CVE-2024-12398,https://securityvulnerability.io/vulnerability/CVE-2024-12398,Improper Privilege Management in Zyxel WBE530 and WBE660S Firmware,"An improper privilege management vulnerability exists in the web management interface of Zyxel WBE530 and WBE660S firmware versions. This vulnerability allows an authenticated user with limited permissions to escalate their privileges to that of an administrator. By exploiting this flaw, a malicious user gains the ability to upload potentially harmful configuration files to the device, which can compromise the security and integrity of the affected system.",Zyxel,"Wbe530 Firmware,Wbe660s Firmware",8.8,HIGH,0.0004900000058114529,false,,false,false,false,,false,false,false,,2025-01-14T01:39:04.348Z,0 CVE-2024-9200,https://securityvulnerability.io/vulnerability/CVE-2024-9200,Post-Authentication Command Injection Vulnerability,"A vulnerability exists in the Zyxel VMG4005-B50A where an authenticated attacker with administrator privileges can exploit the 'host' parameter of the diagnostic function. This post-authentication command injection flaw permits the execution of operating system commands on the device. As a result, this can lead to unauthorized actions that compromise the integrity and security of the affected device, posing significant risks to network security.",Zyxel,Vmg4005-b50a Firmware,7.2,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-12-03T01:33:47.398Z,0 CVE-2024-9197,https://securityvulnerability.io/vulnerability/CVE-2024-9197,Post-Authentication Buffer Overflow Vulnerability Could Lead to DoS,"A post-authentication buffer overflow vulnerability in the parameter ""action"" of the CGI program in Zyxel VMG3625-T50B firmware versions through V5.50(ABPM.9.2)C0 could allow an authenticated attacker with administrator privileges to cause a temporary denial of service (DoS) condition against the web management interface by sending a crafted HTTP GET request to a vulnerable device if the function ZyEE is enabled.",Zyxel,Vmg3625-t50b Firmware,4.9,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2024-12-03T01:24:36.983Z,0 CVE-2024-8748,https://securityvulnerability.io/vulnerability/CVE-2024-8748,Buffer Overflow Vulnerability in Libclinkc Could Lead to Temporary DoS,"A buffer overflow vulnerability exists within the packet parser of the third-party library 'libclinkc' used in Zyxel VMG8825-T50K firmware. This vulnerability can be exploited by sending a specially crafted HTTP POST request to the device, potentially leading to a denial of service condition which affects the web management interface. This flaw underscores the importance of maintaining up-to-date firmware to mitigate potential security risks for users relying on this device.",Zyxel,Vmg8825-t50k Firmware,7.5,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-12-03T01:15:46.610Z,0 CVE-2024-11667,https://securityvulnerability.io/vulnerability/CVE-2024-11667,Directory Traversal Vulnerability in Zyxel ATP and USG FLEX Products,"CVE-2024-11667 is a directory traversal vulnerability identified in the web management interface of several Zyxel firmware versions. This flaw exists in Zyxel's ATP Series, USG FLEX Series, and USG20(W)-VPN Series firmware versions, which could potentially enable an unauthorized attacker to exploit crafted URLs to upload or download arbitrary files. Effective security measures and updated firmware are essential to protect against potential attacks leveraging this vulnerability. Organizations using these products should consult Zyxel's advisory for remediation steps.",Zyxel,"Atp Series Firmware,Usg Flex Series Firmware,Usg Flex 50(w) Series Firmware,Usg20(w)-vpn Series Firmware",9.8,CRITICAL,0.18846000730991364,true,2024-12-03T00:00:00.000Z,true,true,true,2024-11-29T09:18:41.000Z,,false,false,,2024-11-27T09:39:41.691Z,0 CVE-2024-11494,https://securityvulnerability.io/vulnerability/CVE-2024-11494,Unauthenticated Attacker Could Read device Information via HTTP HEAD Method,"An improper authentication vulnerability exists in Zyxel's P-6101C ADSL modem, specifically in firmware version P-6101CSA6AP_20140331. This flaw enables an unauthenticated attacker to potentially access sensitive device information through crafted HTTP HEAD requests. Exploitation of this vulnerability could lead to unauthorized information disclosure, raising significant concerns for users relying on this product for network connectivity.",Zyxel,P-6101c Firmware,7.5,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-20T09:36:06.694Z,0 CVE-2024-8882,https://securityvulnerability.io/vulnerability/CVE-2024-8882,Zyxel GS1900-48 switch vulnerable to buffer overflow DoS attack,"A buffer overflow vulnerability exists in the CGI program of the Zyxel GS1900-48 switch, specifically in firmware version V2.80(AAHN.1)C0 and earlier. This vulnerability may be exploited by an authenticated attacker with administrator privileges on a LAN. By sending a specially crafted URL, the attacker could potentially trigger denial of service conditions, impacting the availability and functionality of the device. Addressing this vulnerability is essential to maintain the integrity and security of your network.",Zyxel,Gs1900-48 Firmware,4.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-12T01:23:57.405Z,0 CVE-2024-8881,https://securityvulnerability.io/vulnerability/CVE-2024-8881,Post-Authentication Command Injection Vulnerability Affects Zyxel GS1900-48 Switch,"A security vulnerability exists in the CGI program of the Zyxel GS1900-48 switch firmware that allows an authenticated attacker with admin privileges to execute operating system commands. This occurs through the manipulation of crafted HTTP requests sent to the affected device. The implications of such unauthorized command execution can lead to significant exploitation potential, highlighting the importance of immediate remediation for devices running vulnerable firmware versions.",Zyxel,Gs1900-48 Firmware,6.8,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-12T01:17:36.728Z,0 CVE-2024-38269,https://securityvulnerability.io/vulnerability/CVE-2024-38269,Memory Buffer Restriction Vulnerability in Zyxel VMG8825-T50K Firmware,"An improper restriction of operations within the bounds of a memory buffer in the USB file-sharing handler of the Zyxel VMG8825-T50K firmware versions through 5.50(ABOM.8)C0 could allow an authenticated attacker with administrator privileges to cause potential memory corruptions, resulting in a thread crash on an affected device.",Zyxel,Vmg8825-t50k Firmware,4.9,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2024-09-24T01:38:14.149Z,0 CVE-2024-38268,https://securityvulnerability.io/vulnerability/CVE-2024-38268,Memory Buffer Vulnerability in Zyxel VMG8825-T50K Firmware Could Lead to Thread Crash and Memory Corruption,"An improper restriction of operations within the bounds of a memory buffer in the MAC address parser of the Zyxel VMG8825-T50K firmware versions through 5.50(ABOM.8)C0 could allow an authenticated attacker with administrator privileges to cause potential memory corruptions, resulting in a thread crash on an affected device.",Zyxel,Vmg8825-t50k Firmware,4.9,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2024-09-24T01:35:22.675Z,0 CVE-2024-38267,https://securityvulnerability.io/vulnerability/CVE-2024-38267,Memory Buffer Restriction Vulnerability Affects Zyxel VMG8825-T50K Firmware,"An improper restriction of operations within the bounds of a memory buffer in the IPv6 address parser of the Zyxel VMG8825-T50K firmware versions through 5.50(ABOM.8)C0 could allow an authenticated attacker with administrator privileges to cause potential memory corruptions, resulting in a thread crash on an affected device.",Zyxel,Vmg8825-t50k Firmware,4.9,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2024-09-24T01:30:45.720Z,0 CVE-2024-38266,https://securityvulnerability.io/vulnerability/CVE-2024-38266,Buffer Overflow Vulnerability Could Lead to Memory Corruptions and Thread Crashes,"An improper restriction of operations within the bounds of a memory buffer in the parameter type parser of the Zyxel VMG8825-T50K firmware versions through 5.50(ABOM.8)C0 could allow an authenticated attacker with administrator privileges to cause potential memory corruptions, resulting in a thread crash on an affected device.",Zyxel,Vmg8825-t50k Firmware,4.9,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2024-09-24T01:26:31.998Z,0 CVE-2024-38270,https://securityvulnerability.io/vulnerability/CVE-2024-38270,Insufficient Entropy Vulnerability in Zyxel GS1900-10HP Firmware Could Allow LAN-Based Attackers to Gain Valid Session Token,An insufficient entropy vulnerability caused by the improper use of a randomness function with low entropy for web authentication tokens generation exists in the Zyxel GS1900-10HP firmware version V2.80(AAZI.0)C0. This vulnerability could allow a LAN-based attacker a slight chance to gain a valid session token if multiple authenticated sessions are alive.,Zyxel,Gs1900-10HP Firmware,6.5,MEDIUM,0.0005200000014156103,false,,false,false,false,,,false,false,,2024-09-10T02:15:00.000Z,0 CVE-2024-6342,https://securityvulnerability.io/vulnerability/CVE-2024-6342,Crafted HTTP POST request can execute OS commands,"A command injection vulnerability exists in the export-cgi program within Zyxel NAS326 and NAS542 firmware, allowing unauthenticated attackers to execute operating system commands. This can be exploited by sending crafted HTTP POST requests, potentially compromising the integrity and operational functionality of the affected devices. Users of the NAS326 and NAS542 models should review the firmware versions to mitigate risks associated with this vulnerability.",Zyxel,"Nas326 Firmware,Nas542 Firmware",9.8,CRITICAL,0.0004299999854993075,false,,true,false,false,,,false,false,,2024-09-10T01:55:13.215Z,0 CVE-2024-7261,https://securityvulnerability.io/vulnerability/CVE-2024-7261,"Unauthenticated OS Command Execution Vulnerability in Zyxel NWA1123ACv3, WAC500, WAX655E, WBE530, and USG LITE 60AX Firmware","An OS command injection vulnerability exists in the CGI program of several Zyxel network devices due to improper neutralization of special elements in the 'host' parameter. This flaw can allow unauthenticated attackers to execute arbitrary OS commands on vulnerable devices by sending specially crafted cookies. The affected products include various firmware versions of the NWA1123ACv3, WAC500, WAX655E, WBE530, and USG LITE 60AX, which can expose organizations to significant security risks.",Zyxel,"Nwa1123acv3 Firmware,Wac500 Firmware,Wax655e Firmware,Wbe530 Firmware,Usg Lite 60ax Firmware",9.8,CRITICAL,0.0008999999845400453,false,,false,false,false,,,false,false,,2024-09-03T02:10:25.112Z,0 CVE-2024-42061,https://securityvulnerability.io/vulnerability/CVE-2024-42061,"Reflected Cross-Site Scripting Vulnerability in Zyxel ATP Series, USG FLEX Series, USG FLEX 50(W) Series, and USG20(W)-VPN Series Firmware","A reflected cross-site scripting (XSS) vulnerability in the CGI program ""dynamic_script.cgi"" of Zyxel ATP series firmware versions from V4.32 through V5.38, USG FLEX series firmware versions from V4.50 through V5.38, USG FLEX 50(W) series firmware versions from V4.16 through V5.38, and USG20(W)-VPN series firmware versions from V4.16 through V5.38 could allow an attacker to trick a user into visiting a crafted URL with the XSS payload. The attacker could obtain browser-based information if the malicious script is executed on the victim’s browser.",Zyxel,"Atp Series Firmware,Usg Flex Series Firmware,Usg Flex 50(w) Series Firmware,Usg20(w)-vpn Series Firmware",6.1,MEDIUM,0.0004600000102072954,false,,false,false,false,,,false,false,,2024-09-03T01:59:36.884Z,0 CVE-2024-42060,https://securityvulnerability.io/vulnerability/CVE-2024-42060,Post-Authentication Command Injection Vulnerability Affects Zyxel ATP Series devices,"The vulnerability in Zyxel products is a post-authentication command injection flaw that permits an authenticated user with administrative privileges to execute arbitrary operating system commands. This exploit arises when a crafted internal user agreement file is uploaded to affected devices, specifically those running vulnerable firmware versions across various Zyxel firewall product lines. Organizations using Zyxel ATP series, USG FLEX series, and USG20 VPN series should evaluate their systems for these vulnerabilities to prevent potential exploitation.",Zyxel,"Atp Series Firmware,Usg Flex Series Firmware,Usg Flex 50(w) Series Firmware,Usg20(w)-vpn Series Firmware",7.2,HIGH,0.0005200000014156103,false,,false,false,false,,,false,false,,2024-09-03T01:54:57.221Z,0 CVE-2024-42059,https://securityvulnerability.io/vulnerability/CVE-2024-42059,Post-Authentication Command Injection Vulnerability,"A post-authentication command injection vulnerability exists in the firmware of multiple Zyxel products, specifically within the ATP series, USG FLEX series, and USG20(W)-VPN series. This vulnerability permits an authenticated attacker possessing administrator privileges to execute arbitrary operating system commands on affected devices. The exploitation vector involves uploading a specially crafted compressed language file via FTP. The following firmware versions are affected: ATP series from V5.00 to V5.38, USG FLEX series from V5.00 to V5.38, USG FLEX 50(W) series from V5.00 to V5.38, and USG20(W)-VPN series from V5.00 to V5.38. For further details and mitigations, it is advisable to refer to Zyxel's official security advisory.",Zyxel,"Atp Series Firmware,Usg Flex Series Firmware,Usg Flex 50(w) Series Firmware,Usg20(w)-vpn Series Firmware",7.2,HIGH,0.0005200000014156103,false,,false,false,false,,,false,false,,2024-09-03T01:51:20.796Z,0 CVE-2024-42058,https://securityvulnerability.io/vulnerability/CVE-2024-42058,Attackers Can Cause DoS Conditions with Targeted Packets Against Zyxel Devices,"A null pointer dereference vulnerability exists in the firmware of various Zyxel firewall products, including the ATP series and the USG FLEX series. This flaw allows unauthenticated attackers to send specially crafted packets to the affected devices, potentially leading to denial-of-service (DoS) conditions. Devices running the specified firmware versions are susceptible to disruptions, underlining the importance of prompt updates and patches to mitigate the risks associated with this vulnerability.",Zyxel,"Atp Series Firmware,Usg Flex Series Firmware,Usg Flex 50(w) Series Firmware,Usg20(w)-vpn Series Firmware",7.5,HIGH,0.0004600000102072954,false,,false,false,false,,,false,false,,2024-09-03T01:47:29.258Z,0 CVE-2024-42057,https://securityvulnerability.io/vulnerability/CVE-2024-42057,"Unauthenticated Command Injection Vulnerability in Zyxel ATP Series, USG FLEX Series, and USG20(W)-VPN Series Firmware","A command injection vulnerability exists in the IPSec VPN feature of multiple Zyxel firewall products, including ATP and USG FLEX series. This vulnerability could permit an unauthenticated attacker to execute operating system commands on the targeted device. Exploitation requires the device to be configured in User-Based-PSK authentication mode and for there to be a valid user with a username longer than 28 characters. This potential risk highlights the need for users to monitor their configurations and implement necessary security measures.",Zyxel,"Atp Series Firmware,Usg Flex Series Firmware,Usg Flex 50(w) Series Firmware,Usg20(w)-vpn Series Firmware",8.1,HIGH,0.0008999999845400453,false,,false,false,false,,,false,false,,2024-09-03T01:43:28.106Z,0 CVE-2024-7203,https://securityvulnerability.io/vulnerability/CVE-2024-7203,Post-Authentication Command Injection Vulnerability Affects Zyxel ATP Series Firmware,"A post-authentication command injection vulnerability exists in Zyxel ATP and USG FLEX series firmware that could allow an authenticated attacker with administrator privileges to execute arbitrary operating system commands. This vulnerability arises when a crafted command is executed within the command-line interface, potentially compromising the integrity and security of the affected devices. Users are advised to review their current firmware versions and apply necessary updates to mitigate potential risks.",Zyxel,"Atp Series Firmware,Usg Flex Series Firmware",7.2,HIGH,0.0005200000014156103,false,,false,false,false,,,false,false,,2024-09-03T01:36:32.110Z,0 CVE-2024-6343,https://securityvulnerability.io/vulnerability/CVE-2024-6343,Zyxel ATP Series Buffer Overflow Vulnerability Could Lead to DoS Conditions,"A buffer overflow vulnerability in the CGI program of Zyxel ATP series firmware versions from V4.32 through V5.38, USG FLEX series firmware versions from V4.50 through V5.38, USG FLEX 50(W) series firmware versions from V4.16 through V5.38, and USG20(W)-VPN series firmware versions from V4.16 through V5.38 could allow an authenticated attacker with administrator privileges to cause denial of service (DoS) conditions by sending a crafted HTTP request to a vulnerable device.",Zyxel,"Atp Series Firmware,Usg Flex Series Firmware,Usg Flex 50(w) Series Firmware,Usg20(w)-vpn Series Firmware",4.9,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2024-09-03T01:28:27.056Z,0