Critical Zyxel router flaw exposed devices to remote attacks
好,我现在要帮用户总结这篇文章。用户的要求是用中文,控制在100字以内,不需要特定的开头,直接描述内容。 首先,我快速浏览文章内容。文章主要讲的是Zyxel路由器的一个严重漏洞,允许未认证的攻击者远程执行命令。漏洞编号是CVE-2025-13942,CVSS评分9.8分,影响了十几个路由器型号。 接着,文章提到这个漏洞存在于UPnP功能中,攻击者可以通过精心构造的UPnP请求执行操作系统命令。远程利用需要同时开启WAN访问和易受攻击的UPnP功能,默认情况下WAN访问是关闭的。 然后,文章还提到Zyxel计划在2026年3月发布补丁,并修复了其他几个漏洞,包括CVE-2025-11847、CVE-2025-11848等。这些漏洞涉及空指针解引用和认证后的命令注入问题。 最后,文章建议用户立即更新路由器固件以防止被攻击。 现在我需要把这些信息浓缩到100字以内。重点包括:Zyxel修复了严重漏洞(CVE-2025-13942),影响多个路由器型号;该漏洞允许远程代码执行;通过UPnP功能利用;默认WAN访问关闭;其他漏洞也已修复;建议更新固件。 确保语言简洁明了,不使用复杂的术语,同时涵盖关键点:漏洞名称、影响范围、攻击方式、默认设置、其他问题和建议措施。 </think> Zyxel修复了多个路由器中的严重漏洞(CVE-2025-13942),该漏洞允许未认证攻击者通过UPnP功能远程执行命令。默认情况下WAN访问关闭,需同时启用WAN和易受攻击的UPnP功能才能远程利用。此外还修复了其他多个漏洞,并建议用户立即更新固件以防止被攻击。 2026-2-25 20:28:45 Author: securityaffairs.com(查看原文) 阅读量:11 收藏

Critical Zyxel router flaw exposed devices to remote attacks

Pierluigi Paganini February 25, 2026

Zyxel fixed a critical flaw in multiple routers that lets unauthenticated attackers remotely execute commands on vulnerable devices.

Zyxel addressed a critical remote code execution vulnerability, tracked as CVE-2025-13942 (CVSS score of 9.8), affecting more than a dozen router models.

A command injection flaw in the UPnP feature of several Zyxel CPEs, Fiber ONTs, and wireless extenders lets attackers run OS commands via crafted UPnP requests. Remote exploitation requires both WAN access and the vulnerable UPnP function to be enabled, as WAN access is disabled by default.

“A command injection vulnerability in the UPnP function of certain 4G LTE/5G NR CPE, DSL/Ethernet CPE, Fiber ONTs, and Wireless Extenders firmware versions could allow a remote attacker to execute operating system (OS) commands on an affected device by sending specially crafted UPnP SOAP requests.” reads the advisory published by the vendor. “It is important to note that WAN access is disabled by default on these devices, and the attack can be carried out remotely only if both WAN access and the vulnerable UPnP function have been enabled.”

CVE-2026-1459 affects several Zyxel DSL/Ethernet CPE router models, including DX5401-B1, EMG3525-T50B, EMG5523-T50B, VMG3625-T50B/C, and VMG8623-T50B running specified firmware versions and earlier. Zyxel plans to release patched firmware versions for all impacted models in March 2026.

The Taiwanese manufacturer also addressed other vulnerabilities affecting multiple Zyxel CPEs, Fiber ONTs, security routers, and wireless extenders. CVE-2025-11847 and CVE-2025-11848 are null pointer dereference flaws in IP settings and Wake-on-LAN CGI components that allow authenticated administrators to trigger a denial-of-service via crafted HTTP requests. CVE-2025-13943 and CVE-2026-1459 are post-authentication command injection bugs in log download and TR-369 certificate functions, enabling OS command execution. In all cases, WAN access remains disabled by default, and successful exploitation requires compromised administrator credentials.

The researcher Tiantai Zhang from Purdue University disclosed the vulnerabilities CVE-2025-11845, CVE-2025-11846, CVE-2025-11847, and CVE-2025-11848.

Víctor Fresco (@hacefresko) reported the flaws CVE-2025-13942 and CVE-2025-13943, while Watchful IP disclosed the flaw CVE-2026-1459.

Users are urged to update affected routers immediately to prevent exploitation.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Zyxel)




文章来源: https://securityaffairs.com/188501/security/critical-zyxel-router-flaw-exposed-devices-to-remote-attacks.html
如有侵权请联系:admin#unsafe.sh