Home

Description

A post-authentication command injection vulnerability in Zyxel ATP series firmware versions from V4.32 through V5.40, USG FLEX series firmware versions from V4.50 through V5.40, USG FLEX 50(W) series firmware versions from V4.16 through V5.40, and USG20(W)-VPN series firmware versions from V4.16 through V5.40 could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on the affected device by passing a crafted string as an argument to a CLI command.

PUBLISHED Reserved 2025-07-23 | Published 2025-10-21 | Updated 2025-10-22 | Assigner Zyxel




HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unaffected

versions from V4.32 through V5.40
affected

Default status
unaffected

version from V4.50 through V5.40
affected

Default status
unaffected

versions from V4.16 through V5.40
affected

Default status
unaffected

versions from V4.16 through V5.40
affected

References

www.zyxel.com/...vulnerabilities-in-zld-firewalls-10-21-2025 vendor-advisory

cve.org (CVE-2025-8078)

nvd.nist.gov (CVE-2025-8078)

Download JSON