9.8
CVE-2025-13942
- EPSS 0.18%
- Veröffentlicht 24.02.2026 02:32:18
- Zuletzt bearbeitet 25.02.2026 18:13:10
- Quelle security@zyxel.com.tw
- CVE-Watchlists
- Unerledigt
A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 firmware versions through 5.17(ABUP.15.1)C0 could allow a remote attacker to execute operating system (OS) commands on an affected device by sending specially crafted UPnP SOAP requests.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Zyxel ≫ Wx5610-b0 Firmware Version < 5.18\(acgj.0.5\)c0
Zyxel ≫ Lte3301-plus Firmware Version < 1.00\(abqu.9\)c0
Zyxel ≫ Nebula Lte3301-plus Firmware Version < 1.18\(acca.6\)v0
Zyxel ≫ Nr7101 Firmware Version < 1.00\(abuv.12\)b2
Zyxel ≫ Nebula Nr7101 Firmware Version < 1.16\(accc.1\)v0
Zyxel ≫ Dx4510-b0 Firmware Version < 5.17\(abyl.10.1\)c0
Zyxel ≫ Dx4510-b1 Firmware Version < 5.17\(abyl.10.1\)c0
Zyxel ≫ Ee6510-10 Firmware Version < 5.19\(acjq.4.1\)c0
Zyxel ≫ Emg6726-b10a Firmware Version < 5.13\(abnp.8.2\)c1
Zyxel ≫ Ex2210-t0 Firmware Version < 5.50\(acdi.2.4\)c0
Zyxel ≫ Ex3510-b0 Firmware Version < 5.17\(abup.15.2\)c0
Zyxel ≫ Ex3510-b1 Firmware Version < 5.17\(abup.15.2\)c0
Zyxel ≫ Ex5510-b0 Firmware Version < 5.17\(abqx.11.1\)c0
Zyxel ≫ Ex5512-t0 Firmware Version < 5.70\(aceg.5.4\)c0
Zyxel ≫ Ex7710-b0 Firmware Version < 5.18\(acak.1.6\)c0
Zyxel ≫ Vmg4927-b50a Firmware Version < 5.13\(ably.10.2\)c0
Zyxel ≫ Px3321-t1 Firmware Version < 5.44\(acjb.1.5\)c0
Zyxel ≫ Px3321-t1 Firmware Version < 5.44\(achk.3\)c0
Zyxel ≫ Px5301-t0 Firmware Version < 5.44\(ackb.0.6\)c0
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.18% | 0.395 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| security@zyxel.com.tw | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.