Overview
Multiple Zyxel DSL CPE devices contain a post-authentication command injection vulnerability in the management commands that could allow an authenticated attacker to execute OS commands via Telnet.
https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 ; https://www.zyxel.com/service-provider/global/en/security-advisories/zyxel-security-advisory-command-injection-insecure-in-certain-legacy-dsl-cpe-02-04-2025 ; https://nvd.nist.gov/vuln/detail/CVE-2024-40891
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2024-40891 |
| Vendor / Product | Zyxel — DSL CPE Devices |
| NVD Published | 2025-02-04 |
| NVD Last Modified | 2025-10-27 |
| CVSS 3.1 Score | 8.8 |
| CVSS 3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| Severity | HIGH |
| CWE | CWE-78 |
| CISA KEV Added | 2025-02-11 |
| CISA KEV Deadline | 2025-03-04 |
| Known Ransomware Use | No |
CVSS 3.1 Breakdown
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Required Action
CISA BOD 22-01 Deadline: 2025-03-04.
The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.
Timeline
| Date | Event |
|---|---|
| 2025-02-11 | Added to CISA Known Exploited Vulnerabilities catalog |
| 2025-03-04 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2024-40891 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |