CVE-2024-40891

Zyxel DSL CPE Devices — Zyxel DSL CPE OS Command Injection Vulnerability
⚠️ CVSS 3.1  8.8 / 10 — HIGH 🔴 CISA Known Exploited Vulnerability

Overview

Multiple Zyxel DSL CPE devices contain a post-authentication command injection vulnerability in the management commands that could allow an authenticated attacker to execute OS commands via Telnet.

https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 ; https://www.zyxel.com/service-provider/global/en/security-advisories/zyxel-security-advisory-command-injection-insecure-in-certain-legacy-dsl-cpe-02-04-2025 ; https://nvd.nist.gov/vuln/detail/CVE-2024-40891

Key Details

PropertyValue
CVE ID CVE-2024-40891
Vendor / Product Zyxel — DSL CPE Devices
NVD Published2025-02-04
NVD Last Modified2025-10-27
CVSS 3.1 Score8.8
CVSS 3.1 VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
SeverityHIGH
CWE CWE-78
CISA KEV Added2025-02-11
CISA KEV Deadline2025-03-04
Known Ransomware Use No

CVSS 3.1 Breakdown

Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Required Action

CISA BOD 22-01 Deadline: 2025-03-04. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.

Timeline

DateEvent
2025-02-11Added to CISA Known Exploited Vulnerabilities catalog
2025-03-04CISA BOD 22-01 remediation deadline

References

ResourceType
NVD — CVE-2024-40891 Vulnerability Database
CISA KEV Catalog Entry US Government