8.8
CVE-2025-13943
- EPSS 0.07%
- Veröffentlicht 24.02.2026 02:38:05
- Zuletzt bearbeitet 25.02.2026 18:13:55
- Quelle security@zyxel.com.tw
- CVE-Watchlists
- Unerledigt
A post-authentication command injection vulnerability in the log file download function of the Zyxel EX3301-T0 firmware versions through 5.50(ABVY.7)C0 could allow an authenticated attacker to execute operating system (OS) commands on an affected device.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Zyxel ≫ Ee5301-00 Firmware Version < 5.63\(acld.2.1\)c0
Zyxel ≫ Ee3301-00 Firmware Version < 5.63\(acmu.2.1\)c0
Zyxel ≫ Dx5401-b1 Firmware Version < 5.17\(abyo.7.1\)c0
Zyxel ≫ Dx4510-b1 Firmware Version < 5.17\(abyl.10.1\)c0
Zyxel ≫ Dx4510-b0 Firmware Version < 5.17\(abyl.10.1\)c0
Zyxel ≫ Dx3301-t0 Firmware Version < 5.50\(abvy.7.1\)c0
Zyxel ≫ Dx3300-t1 Firmware Version < 5.50\(abvy.7.1\)c0
Zyxel ≫ Dx3300-t0 Firmware Version < 5.50\(abvy.7.1\)c0
Zyxel ≫ Ee6510-10 Firmware Version < 5.19\(acjq.4.1\)c0
Zyxel ≫ Emg3525-t50b Firmware Version < 5.50\(abpm.9.7\)c0
Zyxel ≫ Emg5523-t50b Firmware Version < 5.50\(abpm.9.7\)c0
Zyxel ≫ Ex2210-t0 Firmware Version < 5.50\(acdi.2.3\)c0
Zyxel ≫ Ex3300-t0 Firmware Version < 5.50\(abvy.7.1\)c0
Zyxel ≫ Ex3300-t1 Firmware Version < 5.50\(abvy.7.1\)c0
Zyxel ≫ Ex3301-t0 Firmware Version < 5.50\(abvy.7.1\)c0
Zyxel ≫ Ex3500-t0 Firmware Version < 5.44\(achr.5.1\)c0
Zyxel ≫ Ex3501-t0 Firmware Version < 5.44\(achr.5.1\)c0
Zyxel ≫ Ex3510-b0 Firmware Version < 5.17\(abup.15.2\)c0
Zyxel ≫ Ex3510-b1 Firmware Version < 5.17\(abup.15.2\)c0
Zyxel ≫ Ex3600-t0 Firmware Version < 5.70\(acif.2.1\)c0
Zyxel ≫ Ex5401-b1 Firmware Version < 5.17\(abyo.7.1\)c0
Zyxel ≫ Ex5510-b0 Firmware Version < 5.17\(abqx.11.1\)c0
Zyxel ≫ Ex5512-t0 Firmware Version < 5.70\(aceg.5.3\)c0
Zyxel ≫ Ex5601-t0 Firmware Version < 5.70\(acdz.5.1\)c0
Zyxel ≫ Ex5601-t1 Firmware Version < 5.70\(acdz.5.1\)c0
Zyxel ≫ Ex7501-b0 Firmware Version < 5.18\(achn.3.1\)c0
Zyxel ≫ Ex7710-b0 Firmware Version < 5.18\(acak.1.6\)c0
Zyxel ≫ Gm4100-b0 Firmware Version < 5.18\(accl.2\)c0
Zyxel ≫ Pm7500-00 Firmware Version < 5.61\(ackk.1.2\)c0
Zyxel ≫ Vmg3625-t50b Firmware Version < 5.50\(abpm.9.7\)c0
Zyxel ≫ Vmg4005-b50a Firmware Version < 5.17\(abqa.3.2\)c0
Zyxel ≫ Vmg4005-b60a Firmware Version < 5.17\(abqa.3.2\)c0
Zyxel ≫ Ax7501-b1 Firmware Version < 5.17\(abpc.7.1\)c0
Zyxel ≫ Pe3301-00 Firmware Version < 5.63\(acmt.2.1\)c0
Zyxel ≫ Pe5301-01 Firmware Version < 5.63\(acoj.2.1\)c0
Zyxel ≫ Pm3100-t0 Firmware Version < 5.42\(acbf.4.1\)c0
Zyxel ≫ Pm5100-t0 Firmware Version < 5.42\(acbf.4.1\)c0
Zyxel ≫ Pm5100-t1 Firmware Version < 5.42\(acbf.4.1\)c0
Zyxel ≫ Pm7300-t0 Firmware Version < 5.42\(abyy.4.1\)c0
Zyxel ≫ Px3321-t1 Firmware Version < 5.44\(achk.3\)c0
Zyxel ≫ Px3321-t1 Firmware Version < 5.44\(acjb.1.5\)c0
Zyxel ≫ Px5301-t0 Firmware Version < 5.44\(ackb.0.6\)c0
Zyxel ≫ Vmg8623-t50b Firmware Version < 5.50\(abpm.9.7\)c0
Zyxel ≫ We3300-00 Firmware Version < 5.70\(acka.1.1\)c0
Zyxel ≫ Wx3100-t0 Firmware Version < 5.50\(abvl.4.9\)c0
Zyxel ≫ Wx3401-b1 Firmware Version < 5.17\(abve.2.10\)c0
Zyxel ≫ Wx5600-t0 Firmware Version < 5.70\(aceb.5.1\)c0
Zyxel ≫ Wx5610-b0 Firmware Version < 5.18\(acgj.0.5\)c0
Zyxel ≫ Dm4200-b0 Firmware Version < 5.17\(acbs.1.6\)c0
Zyxel ≫ We4600-00 Firmware Version < 6.70\(ackt.0\)c0
Zyxel ≫ Emg6726-b10a Firmware Version < 5.13\(abnp.8.2\)c1
Zyxel ≫ Am7510-00 Firmware Version < 5.63\(acoe.0.1\)c0
Zyxel ≫ Vmg4927-b50a Firmware Version < 5.13\(ably.10.2\)c0
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.07% | 0.217 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
| security@zyxel.com.tw | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.