Critical Security Alert: Zyxel Leaves Legacy Routers Vulnerable to Active Exploits

Critical Security Alert: Zyxel Leaves Legacy Routers Vulnerable to Active Exploits

Zyxel CPE Devices Face Critical Security Vulnerabilities

Security researchers have identified serious vulnerabilities in Zyxel CPE Series devices that are currently being exploited by attackers. VulnCheck discovered two significant flaws in July 2024, with GreyNoise confirming active exploitation attempts.

Key Vulnerabilities:

1. CVE-2024-40891:
– Allows authenticated users to exploit Telnet command injection
– Stems from improper command validation in libcms_cli.so
– Enables arbitrary code execution through shell metacharacters

2. CVE-2025-0890:
– Involves weak default credentials (admin:1234, zyuser:1234, supervisor:zyad1234)
– Supervisor account possesses hidden privileges with full system access
– zyuser account can exploit CVE-2024-40891 for remote code execution

Impact and Exposure:
– Over 1,500 affected devices exposed to internet
– Impacts multiple end-of-life (EOL) products
– Affected models include VMG1312-B10A/B/E, VMG3312-B10A, VMG3313-B10A, VMG3926-B10B, VMG4325-B10A, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, SBG3300, and SBG3500

Zyxel’s Response:
– No patches will be issued for affected devices
– Company recommends replacing devices with newer models
– Confirms devices reached EOL status years ago

VulnCheck demonstrated successful exploitation against VMG4325-B10A running firmware version 1.00(AAFR.4)C0_20170615, highlighting the urgent need for users to upgrade their devices to maintain network security.

Share This Article