8.8
CVE-2025-8693
- EPSS 0.13%
- Veröffentlicht 18.11.2025 01:25:05
- Zuletzt bearbeitet 15.12.2025 14:03:35
- Quelle security@zyxel.com.tw
- CVE-Watchlists
- Unerledigt
A post-authentication command injection vulnerability in the "priv" parameter of Zyxel DX3300-T0 firmware version 5.50(ABVY.6.3)C0 and earlier could allow an authenticated attacker to execute operating system (OS) commands on an affected device.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Zyxel ≫ Dm4200-b0 Firmware Version <= 5.17\(acbs.1.3\)c0
Zyxel ≫ Dx3300-t0 Firmware Version <= 5.50\(abvy.6.3\)c0
Zyxel ≫ Dx3300-t1 Firmware Version <= 5.50\(abvy.6.3\)c0
Zyxel ≫ Dx3301-t0 Firmware Version <= 5.50\(abvy.6.3\)c0
Zyxel ≫ Dx4510-b1 Firmware Version <= 5.17\(abyl.9\)c0
Zyxel ≫ Dx5401-b0 Firmware Version <= 5.17\(abyo.7\)b2
Zyxel ≫ Dx5401-b1 Firmware Version <= 5.17\(abyo.7\)b2
Zyxel ≫ Ee3301-00 Firmware Version <= 5.63\(acmu.1.1\)c0
Zyxel ≫ Ee5301-00 Firmware Version <= 5.63\(acld.1.1\)c0
Zyxel ≫ Ee6510-10 Firmware Version <= 5.19\(acjq.3\)c0
Zyxel ≫ Ex3300-t0 Firmware Version <= 5.50\(abvy.6.3\)c0
Zyxel ≫ Ex3300-t0 Firmware Version <= 5.50\(acdi.2.1\)c0
Zyxel ≫ Ex3300-t1 Firmware Version <= 5.50\(abvy.6.3\)c0
Zyxel ≫ Ex3301-t0 Firmware Version <= 5.50\(abvy.6.3\)c0
Zyxel ≫ Ex3500-t0 Firmware Version <= 5.44\(achr.4\)c0
Zyxel ≫ Ex3501-t0 Firmware Version <= 5.44\(achr.4\)c0
Zyxel ≫ Ex3510-b0 Firmware Version <= 5.17\(abup.15\)c0
Zyxel ≫ Ex3510-b1 Firmware Version <= 5.17\(abup.15\)c0
Zyxel ≫ Ex3600-t0 Firmware Version <= 5.70\(acif.1.2\)c0
Zyxel ≫ Ex5401-b0 Firmware Version <= 5.17\(abyo.7\)b2
Zyxel ≫ Ex5401-b1 Firmware Version <= 5.17\(abyo.7\)b2
Zyxel ≫ Ex5501-b0 Firmware Version <= 5.17\(abry.5.5\)c0
Zyxel ≫ Ex5510-b0 Firmware Version <= 5.17\(abqx.10\)c0
Zyxel ≫ Ex5512-t0 Firmware Version <= 5.70\(aceg.5\)c0
Zyxel ≫ Ex5601-t0 Firmware Version <= 5.70\(acdz.4.1\)c0
Zyxel ≫ Ex5601-t1 Firmware Version <= 5.70\(acdz.4.1\)c0
Zyxel ≫ Ex7501-b0 Firmware Version <= 5.18\(achn.2.1\)c0
Zyxel ≫ Ex7710-b0 Firmware Version <= 5.18\(acak.1.4\)c0
Zyxel ≫ Emg3525-t50b Firmware Version <= 5.50\(abpm.9.5\)c0
Zyxel ≫ Emg5523-t50b Firmware Version <= 5.50\(abpm.9.5\)c0
Zyxel ≫ Emg5723-t50k Firmware Version <= 5.50\(abom.8.6\)c0
Zyxel ≫ Gm4100-b0 Firmware Version <= 5.18\(accl.1\)c0
Zyxel ≫ Vmg3625-t50b Firmware Version <= 5.50\(abpm.9.5\)c0
Zyxel ≫ Vmg3927-t50k Firmware Version <= 5.50\(abom.8.6\)c0
Zyxel ≫ Vmg4005-b50a Firmware Version <= 5.17\(abqa.3\)c0
Zyxel ≫ Vmg4005-b60a Firmware Version <= 5.17\(abqa.3\)c0
Zyxel ≫ Vmg4005-b50b Firmware Version <= 5.13\(abrl.5.3\)c0
Zyxel ≫ Vmg8623-t50b Firmware Version <= 5.50\(abpm.9.5\)c0
Zyxel ≫ Vmg8825-t50k Firmware Version <= 5.50\(abom.8.6\)c0
Zyxel ≫ Ax7501-b0 Firmware Version <= 5.17\(abpc.6.1\)c0
Zyxel ≫ Ax7501-b1 Firmware Version <= 5.17\(abpc.6.1\)c0
Zyxel ≫ Pe3301-00 Firmware Version <= 5.63\(acmt.1.1\)c0
Zyxel ≫ Pe5301-01 Firmware Version <= 5.63\(acoj.1.1\)c0
Zyxel ≫ Pm3100-t0 Firmware Version <= 5.42\(acbf.3\)c0
Zyxel ≫ Pm5100-t0 Firmware Version <= 5.42\(acbf.3\)c0
Zyxel ≫ Pm7500-00 Firmware Version <= 5.61\(ackk.1\)c0
Zyxel ≫ Pm7300-t0 Firmware Version <= 5.42\(abyy.3\)c0
Zyxel ≫ Px3321-t1 Firmware Version <= 5.44\(acjb.1.3\)c0
Zyxel ≫ Px3321-t1 Firmware Version <= 5.44\(achk.1\)c0
Zyxel ≫ Px5301-t0 Firmware Version <= 5.44\(ackb.0.4\)c0
Zyxel ≫ We3300-00 Firmware Version <= 5.70\(acka.0\)c0
Zyxel ≫ Wx3100-t0 Firmware Version <= 5.50\(abvl.4.7\)c0
Zyxel ≫ Wx3401-b0 Firmware Version <= 5.17\(abve.2.8\)c0
Zyxel ≫ Wx3401-b1 Firmware Version <= 5.17\(abve.2.8\)c0
Zyxel ≫ Wx5600-t0 Firmware Version <= 5.70\(aceb.4.1\)c0
Zyxel ≫ Wx5610-b0 Firmware Version <= 5.18\(acgj.0.3\)c0
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.13% | 0.321 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@zyxel.com.tw | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.