Zyxel warns of critical RCE flaw affecting over a dozen routers
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户给的文章是关于Zyxel公司发布安全更新,修复路由器中的一个关键漏洞。首先,我要通读整篇文章,抓住主要信息点。 文章提到Zyxel发布了安全更新,修复了一个编号为CVE-2025-13942的漏洞,这个漏洞存在于UPnP功能中,影响了多个路由器型号。攻击者可以利用这个漏洞执行操作系统命令。不过,成功利用该漏洞需要UPnP和WAN访问都启用,而WAN访问默认是关闭的。 此外,文章还提到Zyxel修复了另外两个高危漏洞,并且有很多Zyxel设备暴露在互联网上。美国CISA正在跟踪多个Zyxel漏洞,并且Zyxel之前还警告过一些零日漏洞的情况。 现在我需要把这些信息浓缩到100字以内。重点包括:Zyxel修复了关键漏洞CVE-2025-13942,影响多个路由器型号;该漏洞允许未认证攻击者执行命令;需要UPnP和WAN访问启用;修复建议;以及设备暴露情况和CISA的跟踪。 最后,确保语言简洁明了,不使用开头的“这篇文章”之类的词汇。检查字数是否符合要求。 </think> Zyxel发布安全更新修复影响多款路由器的关键漏洞CVE-2025-13942,该漏洞可被未认证攻击者利用UPnP功能远程执行操作系统命令。成功攻击需启用UPnP和WAN访问(默认关闭)。公司建议用户安装补丁以增强防护。 2026-2-25 13:1:10 Author: www.bleepingcomputer.com(查看原文) 阅读量:13 收藏

Zyxel

Taiwan networking provider Zyxel has released security updates to address a critical vulnerability affecting over a dozen router models that can allow unauthenticated attackers to gain remote command execution on unpatched devices.

Tracked as CVE-2025-13942, this command injection security flaw was found in the UPnP function of Zyxel 4G LTE/5G NR CPE, DSL/Ethernet CPE, Fiber ONTs, and wireless extenders.

Zyxel says that unauthenticated remote attackers can exploit it to execute operating system (OS) commands on an affected device using maliciously crafted UPnP SOAP requests.

Wiz

However, CVE-2025-13942 attacks will likely be more limited than the severity rating suggests, as successful exploitation requires UPnP and WAN access to be enabled, with the latter disabled by default.

"It is important to note that WAN access is disabled by default on these devices, and the attack can be carried out remotely only if both WAN access and the vulnerable UPnP function have been enabled," Zyxel said. "Users are strongly advised to install the patches to maintain optimal protection."

On Tuesday, Zyxel also patched two high-severity post-authentication command-injection vulnerabilities (CVE-2025-13943 and CVE-2026-1459) that allow threat actors to execute OS commands using compromised credentials.

Internet security watchdog Shadowserver currently tracks nearly 120,000 Internet-exposed Zyxel devices, including over 76,000 routers.

Internet-exposed Zyxel devices
Internet-exposed Zyxel devices (Shadowserver)

​Zyxel devices are often targeted in attacks since they're provided by many internet service providers worldwide as the default out-of-the-box equipment when activating a new internet service contract.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is currently tracking 12 Zyxel vulnerabilitiesimpacting the company's routers, firewalls, and NAS devices that have been or are still actively exploited in the wild.

Earlier this month, Zyxel warned that it has no plans to patch a pair of zero-day security vulnerabilities (CVE-2024-40891 and CVE-2024-40891) that are actively exploited in attacks and affect end-of-life routers still available for sale online. Instead, the company "strongly" advised customers to replace their routers with newer products whose firmware has already been patched.

"VMG1312-B10A, VMG1312-B10B, VMG1312-B10E, VMG3312-B10A, VMG3313-B10A, VMG3926-B10B, VMG4325-B10A, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, SBG3300, and SBG3500, are legacy products that have reached end-of-life (EOL) for years," said Zyxel. "Therefore, we strongly recommend that users replace them with newer-generation products for optimal protection."

Zyxel claims that more than 1 million businesses use its networking products across 150 markets.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/zyxel-warns-of-critical-rce-flaw-affecting-over-a-dozen-routers/
如有侵权请联系:admin#unsafe.sh