{"id":43932,"date":"2026-02-25T21:23:22","date_gmt":"2026-02-25T13:23:22","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/25\/zyxel-warns-of-critical-rce-flaw-affecting-over-a-dozen-routers\/"},"modified":"2026-02-25T21:23:22","modified_gmt":"2026-02-25T13:23:22","slug":"zyxel-warns-of-critical-rce-flaw-affecting-over-a-dozen-routers","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/25\/zyxel-warns-of-critical-rce-flaw-affecting-over-a-dozen-routers\/","title":{"rendered":"Zyxel warns of critical RCE flaw affecting over a dozen routers"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2026\/02\/25\/Zyxel.jpg\" width=\"1600\" alt=\"Zyxel warns of critical RCE flaw affecting over a dozen routers\"><\/p>\n<p>Taiwan networking provider Zyxel has released security updates to address a critical vulnerability affecting over a dozen router models that can allow unauthenticated attackers to gain remote command execution on unpatched devices.<\/p>\n<p>Tracked as CVE-2025-13942, this command injection security flaw was found in the UPnP function of Zyxel 4G LTE\/5G NR CPE, DSL\/Ethernet CPE, Fiber ONTs, and wireless extenders.<\/p>\n<p>Zyxel says that unauthenticated remote attackers can exploit it to execute operating system (OS) commands on an affected device using maliciously crafted UPnP SOAP requests.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.wiz.io\/lp\/ai-security-board-report-template?utm_source=bleepingcomputer&amp;utm_medium=display&amp;utm_campaign=FY26Q4_INB_FORM_AI-Security-Board-Report-Template&amp;sfcid=701Vh00000Wn7E1IAJ&amp;utm_term=FY27-bleepingcomputer-article-970x250&amp;utm_content=AI-Board-Report\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/w\/ai-security-board-report-template.jpg\" style=\"margin-top: 0px;\" alt=\"Zyxel warns of critical RCE flaw affecting over a dozen routers\"><\/a> <\/div>\n<p>However, CVE-2025-13942 attacks will likely be more limited than the severity rating suggests, as successful exploitation requires UPnP and WAN access to be enabled, with the latter disabled by default.<\/p>\n<p>&#8220;It is important to note that WAN access is disabled by default on these devices, and the attack can be carried out remotely only if both WAN access and the vulnerable UPnP function have been enabled,&#8221; <a href=\"https:\/\/www.zyxel.com\/global\/en\/support\/security-advisories\/zyxel-security-advisory-for-null-pointer-dereference-and-command-injection-vulnerabilities-in-certain-4g-lte-5g-nr-cpe-dsl-ethernet-cpe-fiber-onts-security-routers-and-wireless-extenders-02-24-2026\" target=\"_blank\" rel=\"nofollow noopener\">Zyxel said<\/a>. &#8220;Users are strongly advised to install the patches to maintain optimal protection.&#8221;<\/p>\n<p>On Tuesday, Zyxel also patched two high-severity post-authentication command-injection vulnerabilities (<a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-13943\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-13943<\/a> and <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2026-1459\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2026-1459<\/a>) that allow threat actors to execute OS commands using compromised credentials.<\/p>\n<p>Internet security watchdog Shadowserver currently tracks <a href=\"https:\/\/dashboard.shadowserver.org\/statistics\/iot-devices\/time-series\/?date_range=7&amp;vendor=zyxel&amp;dataset=count&amp;limit=100&amp;group_by=geo&amp;stacking=stacked\" target=\"_blank\" rel=\"nofollow noopener\">nearly 120,000 Internet-exposed Zyxel devices<\/a>, including <a href=\"https:\/\/dashboard.shadowserver.org\/statistics\/iot-devices\/time-series\/?date_range=7&amp;vendor=zyxel&amp;type=router&amp;dataset=count&amp;limit=100&amp;group_by=geo&amp;stacking=stacked\" target=\"_blank\" rel=\"nofollow noopener\">over 76,000 routers<\/a>.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"354\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1109292\/2026\/Internet-exposed%20Zyxel%20devices.png\" width=\"700\" alt=\"Zyxel warns of critical RCE flaw affecting over a dozen routers\"><figcaption><em>Internet-exposed Zyxel devices (Shadowserver)<\/em><\/figcaption><\/figure>\n<\/div>\n<p>&#8203;Zyxel devices are often targeted in attacks since they&#8217;re provided by many internet service providers worldwide as the default out-of-the-box equipment when activating a new internet service contract.<\/p>\n<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is currently <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog?search_api_fulltext=Zyxel\" target=\"_blank\" rel=\"nofollow noopener\">tracking 12 Zyxel vulnerabilities<\/a>impacting the company&#8217;s routers, firewalls, and NAS devices that have been or are still actively exploited in the wild.<\/p>\n<p>Earlier this month, Zyxel warned <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/zyxel-wont-patch-newly-exploited-flaws-in-end-of-life-routers\/\" target=\"_blank\" rel=\"nofollow noopener\">that it has no plans to patch<\/a> a pair of zero-day security vulnerabilities (CVE-2024-40891 and CVE-2024-40891) that are <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-exploit-critical-unpatched-flaw-in-zyxel-cpe-devices\/\" target=\"_blank\" rel=\"nofollow noopener\">actively exploited in attacks<\/a> and affect end-of-life routers still available for sale online. Instead, the company &#8220;strongly&#8221; advised customers to replace their routers with newer products whose firmware has already been patched.<\/p>\n<p>&#8220;VMG1312-B10A, VMG1312-B10B, VMG1312-B10E, VMG3312-B10A, VMG3313-B10A, VMG3926-B10B, VMG4325-B10A, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, SBG3300, and SBG3500, are legacy products that have reached end-of-life (EOL) for years,&#8221; said Zyxel. &#8220;Therefore, we strongly recommend that users replace them with newer-generation products for optimal protection.&#8221;<\/p>\n<p>Zyxel claims that more than 1 million businesses use its networking products across 150 markets.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/zyxel-warns-of-critical-rce-flaw-affecting-over-a-dozen-routers\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.bleepstatic.com\/c\/t\/tines-in-art-square.jpg\" alt=\"Zyxel warns of critical RCE flaw affecting over a dozen routers\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">The future of IT infrastructure is here<\/a><\/h2>\n<p>Modern IT infrastructure moves faster than manual workflows can handle.<\/p>\n<p>In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.<\/p>\n<p>          <button><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">Get the guide<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-exploit-critical-react-native-metro-bug-to-breach-dev-systems\/\">Hackers exploit critical React Native Metro bug to breach dev systems<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-d-link-flaw-in-legacy-dsl-routers-actively-exploited-in-attacks\/\">New D-Link flaw in legacy DSL routers actively exploited in attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-beyondtrust-rce-flaw-now-exploited-in-ransomware-attacks\/\">CISA: BeyondTrust RCE flaw now exploited in ransomware attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/flaws-in-popular-vscode-extensions-expose-developers-to-attacks\/\">Flaws in popular VSCode extensions expose developers to attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/one-threat-actor-responsible-for-83-percent-of-recent-ivanti-rce-attacks\/\">One threat actor responsible for 83% of recent Ivanti RCE attacks<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Taiwan networking provider Zyxel has released security  [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-43932","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43932","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43932"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43932\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43932"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43932"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}