**UNSUPPORTED WHEN ASSIGNED** A post-authentication command injection vulnerability in the management commands of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device via Telnet.
https://www.securityweek.com/zyxel-issues-no-patch-warning-for-exploited-zero-days/
https://www.securityweek.com/new-zyxel-zero-day-under-attack-no-patch-available/
https://www.darkreading.com/endpoint-security/unpatched-zyxel-cpe-zero-day-cyberattackers
https://thehackernews.com/2025/01/zyxel-cpe-devices-face-active.html
https://securityaffairs.com/173589/hacking/zyxel-cpe-series-devices-cve-2024-40891-exploited.html
Published: 2025-02-04
Updated: 2025-02-12
Known Exploited Vulnerability (KEV)
Base Score: 9
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C
Severity: High
Base Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity: High
EPSS: 0.36537
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability of Interest