Zyxel Command Injection (CVE-2025-13942)
CVE-2025-13942
A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 firmware versions through 5.17(ABUP.15.1)C0 could allow a remote attacker to execute operating system (OS) commands on an ...
Security Advisory: Critical Command Injection Vulnerability in Zyxel EX3510-B0 UPnP Service
Overview
A critical security flaw has been identified in certain Zyxel EX3510-B0 routers. This vulnerability exists within the Universal Plug and Play (UPnP) service, a common feature that allows devices on a network to automatically discover and communicate with each other. Due to improper validation of input, a remote attacker can exploit this flaw to inject and execute arbitrary operating system commands on the affected device.
Vulnerability Details
The vulnerability is a command injection flaw in the UPnP function of the Zyxel EX3510-B0 firmware. Specifically, it affects firmware versions 5.17(ABUP.15.1)C0 and all prior versions.
The UPnP service listens for requests from devices on the network. By sending a specially crafted SOAP request (a type of network message used by UPnP), an attacker can trick the router into executing malicious commands with the device’s system-level privileges. This attack can be performed remotely without requiring authentication to the device.
The Common Vulnerability Scoring System (CVSS) score for this vulnerability is 9.8 (CRITICAL), indicating a severe risk.
Potential Impact
If successfully exploited, this vulnerability can have severe consequences:
- Full Device Compromise: An attacker can gain complete control over the router, allowing them to modify its configuration, intercept network traffic, or disable it entirely.
- Network Infiltration: A compromised router can serve as a foothold to launch further attacks against other computers, phones, and servers on the internal network.
- Malware Deployment: Attackers could install persistent malware or use the router as part of a botnet for activities like distributed denial-of-service (DDoS) attacks.
- Data Theft: Sensitive data passing through the router could be monitored, intercepted, or redirected.
Affected Products
- Model: Zyxel EX3510-B0
- Affected Firmware Versions: All versions up to and including 5.17(ABUP.15.1)C0.
Remediation and Mitigation
Immediate action is required to protect affected devices.
Primary Solution - Apply a Firmware Update: Zyxel has released a firmware update to address this vulnerability. Users and administrators must:
- Check the official Zyxel support portal for the latest firmware release for the EX3510-B0 model.
- Upgrade the device firmware to a version newer than 5.17(ABUP.15.1)C0 as soon as possible.
Interim Mitigation (If Update is Not Immediately Possible): If updating is delayed, consider these steps to reduce risk:
- Disable UPnP: Log into the router’s web administration interface and disable the UPnP (Universal Plug and Play) feature. This will break the automatic functionality for some applications and devices (like gaming consoles) but removes the attack vector.
- Restrict Access: Ensure the router’s management interface is not exposed to the public internet (WAN). It should only be accessible from your local area network (LAN).
General Recommendation: Always maintain network devices on the latest firmware provided by the vendor to ensure known security vulnerabilities are patched.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSandbox 4.4.0 through 4.4.8 may allow attacker to execute unauthorized code ...
Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in authentication helper execution where helper configuration values are executed using shell=true without ...
PraisonAI is a multi-agent teams system. From version 4.5.15 to before version 4.5.69, the --mcp CLI argument is passed directly to shlex.split() and forwarded through the call chain to anyio.open_pro...
node-tesseract-ocr is an npm package that provides a Node.js wrapper for Tesseract OCR. In all versions through 2.2.1, the recognize() function in src/index.js is vulnerable to OS Command Injection. T...