Created on 2025-02-05 18:26 and updated on 2025-02-05 18:29.

Description

Summary

Zyxel recently became aware of CVE-2024-40890 and CVE-2024-40891 being mentioned in a post on GreyNoise’s blog. Additionally, VulnCheck informed us that they will publish the technical details regarding CVE-2024-40891 and CVE-2025-0890 on their blog. We have confirmed that the affected models reported by VulnCheck, VMG1312-B10A, VMG1312-B10B, VMG1312-B10E, VMG3312-B10A, VMG3313-B10A, VMG3926-B10B, VMG4325-B10A, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, SBG3300, and SBG3500, are legacy products that have reached end-of-life (EOL) for years. Therefore, we strongly recommend that users replace them with newer-generation products for optimal protection. What are the vulnerabilities?

CVE-2024-40890

UNSUPPORTED WHEN ASSIGNED

A post-authentication command injection vulnerability in the CGI program of certain legacy DSL CPE models, including VMG1312-B10A, VMG1312-B10B, VMG1312-B10E, VMG3312-B10A, VMG3313-B10A, VMG3926-B10B, VMG4325-B10A, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, SBG3300, and SBG3500, could allow an authenticated attacker to execute operating system (OS) commands on an affected device by sending a crafted HTTP POST request. It is important to note that WAN access is disabled by default on these devices, and this attack can only be successful if user-configured passwords have been compromised.

CVE-2024-40891

UNSUPPORTED WHEN ASSIGNED

A post-authentication command injection vulnerability in the management commands of certain legacy DSL CPE models, including VMG1312-B10A, VMG1312-B10B, VMG1312-B10E, VMG3312-B10A, VMG3313-B10A, VMG3926-B10B, VMG4325-B10A, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, SBG3300, and SBG3500. This vulnerability could allow an authenticated attacker to execute OS commands on an affected device via Telnet. It is important to note that WAN access and the Telnet function are disabled by default on these devices, and this attack can only be successful if the user-configured passwords have been compromised.

CVE-2025-0890

UNSUPPORTED WHEN ASSIGNED

Insecure default credentials for the Telnet function in certain legacy DSL CPE models, including VMG1312-B10A, VMG1312-B10B, VMG1312-B10E, VMG3312-B10A, VMG3313-B10A, VMG3926-B10B, VMG4325-B10A, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, SBG3300, and SBG3500, could allow an attacker to log in to the management interface if the administrators have the option to change the default credentials but fail to do so. It is important to note that WAN access and the Telnet function are disabled by default on these devices. What should you do?

The following models—VMG1312-B10A, VMG1312-B10B, VMG1312-B10E, VMG3312-B10A, VMG3313-B10A, VMG3926-B10B, VMG4325-B10A, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, SBG3300, and SBG3500—are legacy products that have reached EOL status for several years. In accordance with industry product life cycle management practices, Zyxel advises customers to replace these legacy products with newer-generation equipment for optimal protection. If you obtained your Zyxel product through an internet service provider (ISP), please contact the ISP for support. For ISPs, please contact your Zyxel sales or service representatives for further details.

Additionally, disabling remote access and periodically changing passwords are proactive measures that can help prevent potential attacks.

Coordinated Timeline:

  • 2024-07-13: VulnCheck notified Zyxel about vulnerabilities in the EOL CPE VMG4325-B10A without providing any reports.
  • 2024-07-14: Zyxel requested VulnCheck to provide a detailed report; however, VulnCheck did not respond.
  • 2024-07-31: VulnCheck published CVE-2024-40890 and CVE-2024-40891 on their blog without informing Zyxel.
  • 2025-01-28: GreyNoise published CVE-2024-40890 and CVE-2024-40891 on their blog.
  • 2025-01-29: Zyxel received VulnCheck’s report regarding CVE-2024-40890, CVE-2024-40891, and CVE-2025-0890.
  • 2025-01-29: Zyxel became aware of the vulnerabilities in certain legacy DSL CPE models.

Vulnerabilities included in this bundle

Meta

[
   {
      ref: [
         "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025",
      ],
   },
]

Author

Cédric Bonhomme

Combined sightings

Author Vulnerability Source Type Date
automationCVE-2025-0890https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lk6mo6iclbu2seen19 days ago
automationCVE-2025-0890https://bsky.app/profile/getpokemon7.bsky.social/post/3lhq5c2em2c2gseen1 month ago
automationCVE-2025-0890https://bsky.app/profile/dinosn.bsky.social/post/3lhi5ss4ods2iseen1 month ago
cedricCVE-2025-0890https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025seen1 month ago
automationCVE-2025-0890https://bsky.app/profile/securityrss.bsky.social/post/3lhh4dw23ox25seen1 month ago
automationCVE-2025-0890https://bsky.app/profile/vulnalerts.bsky.social/post/3lhgscf52xo2pseen1 month ago
automationCVE-2025-0890https://bsky.app/profile/hackingne.ws/post/3lhf2uzvjnw2sseen1 month ago
automationCVE-2025-0890https://infosec.exchange/users/screaminggoat/statuses/113946527318610149seen1 month ago
automationCVE-2025-0890https://mastodon.social/users/CyberSignaler/statuses/113945695023265928seen1 month ago
automationCVE-2025-0890https://bsky.app/profile/cve.skyfleet.blue/post/3lhdywerrnf2bseen1 month ago
automationCVE-2025-0890https://bsky.app/profile/cve-notifications.bsky.social/post/3lhdwklgkws2tseen1 month ago
automationCVE-2025-0890https://infosec.exchange/users/cve/statuses/113945094769665038seen1 month ago
automationCVE-2024-40891https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lk6mo6iclbu2seen19 days ago
automationCVE-2024-40891MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123seen1 month ago
automationCVE-2024-40891https://bsky.app/profile/cecallihelper.bsky.social/post/3li2opy5lts2eseen1 month ago
automationCVE-2024-40891https://bsky.app/profile/beikokucyber.bsky.social/post/3lhz32df7lh23seen1 month ago
automationCVE-2024-40891https://bsky.app/profile/getpokemon7.bsky.social/post/3lhy64f2p5c2aseen1 month ago
automationCVE-2024-40891MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123seen1 month ago
automationCVE-2024-40891https://bsky.app/profile/tmjintel.bsky.social/post/3lhwhtxfoek2fseen1 month ago
automationCVE-2024-40891https://infosec.exchange/users/screaminggoat/statuses/113986875105156497seen1 month ago
automationCVE-2024-40891https://feedsin.space/feed/CISAKevBot/items/3318898seen1 month ago
automationCVE-2024-40891https://bsky.app/profile/aakl.bsky.social/post/3lhwdpg4ohd2iseen1 month ago
automationCVE-2024-40891https://bsky.app/profile/aakl.bsky.social/post/3lhwdpg4ohc2iseen1 month ago
automationCVE-2024-40891https://bsky.app/profile/getpokemon7.bsky.social/post/3lhq5c2em2c2gseen1 month ago
automationCVE-2024-40891https://bsky.app/profile/getpokemon7.bsky.social/post/3lhq4wr4ryc2gseen1 month ago
automationCVE-2024-40891https://poliverso.org/objects/0477a01e-a910054a-1b1a0442aae5b72fseen1 month ago
automationCVE-2024-40891https://bsky.app/profile/hacker.at.thenote.app/post/3lhj2xqouhs2nseen1 month ago
automationCVE-2024-40891https://bsky.app/profile/dinosn.bsky.social/post/3lhi5ss4ods2iseen1 month ago
cedricCVE-2024-40891https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025seen1 month ago
automationCVE-2024-40891https://bsky.app/profile/securityrss.bsky.social/post/3lhh4dw23ox25seen1 month ago
automationCVE-2024-40891https://bsky.app/profile/nihonmatsu.bsky.social/post/3lhfzjn2ygs2xseen1 month ago
automationCVE-2024-40891https://bsky.app/profile/nihonmatsu.bsky.social/post/3lhfzevldgs2xseen1 month ago
automationCVE-2024-40891https://bsky.app/profile/hackingne.ws/post/3lhf2uzvjnw2sseen1 month ago
automationCVE-2024-40891https://infosec.exchange/users/screaminggoat/statuses/113946527318610149seen1 month ago
automationCVE-2024-40891https://bsky.app/profile/cve.skyfleet.blue/post/3lhdywehlaf2gseen1 month ago
automationCVE-2024-40891https://mastodon.social/users/CyberSignaler/statuses/113945220952180854seen1 month ago
automationCVE-2024-40891https://bsky.app/profile/cve-notifications.bsky.social/post/3lhdt7c7plq2wseen1 month ago
automationCVE-2024-40891https://infosec.exchange/users/cve/statuses/113945059007016791seen1 month ago
automationCVE-2024-40891https://bsky.app/profile/xc0py.bsky.social/post/3lgy4tb3vys23seen2 months ago
automationCVE-2024-40891https://bsky.app/profile/hacker.at.thenote.app/post/3lgxsgmkges2nseen2 months ago
automationCVE-2024-40891https://bsky.app/profile/hacker.at.thenote.app/post/3lgxkjdluqk2nseen2 months ago
automationCVE-2024-40891https://bsky.app/profile/hacker.at.thenote.app/post/3lgwvnuox622nseen2 months ago
automationCVE-2024-40891https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lgwqwxrqjk2bseen2 months ago
automationCVE-2024-40891https://bsky.app/profile/hacker.at.thenote.app/post/3lgwjjpoups2nseen2 months ago
automationCVE-2024-40891https://bsky.app/profile/youranonriots.bsky.social/post/3lgvxhl2q6s2dseen2 months ago
automationCVE-2024-40891https://bsky.app/profile/tmjintel.bsky.social/post/3lgvx5kaop525seen2 months ago
automationCVE-2024-40891https://bsky.app/profile/infosec.skyfleet.blue/post/3lgvwbgx4zj27seen2 months ago
automationCVE-2024-40891https://bsky.app/profile/beikokucyber.bsky.social/post/3lgvujju3ov2cseen2 months ago
automationCVE-2024-40891https://bsky.app/profile/kitafox.bsky.social/post/3lgvuc43ecb2mseen2 months ago
automationCVE-2024-40891https://bsky.app/profile/potato.software/post/3lgvtdkcxq62pseen2 months ago
automationCVE-2024-40891https://bsky.app/profile/ninjaowl.ai/post/3lgvtdjjzzj2jseen2 months ago
automationCVE-2024-40891https://bsky.app/profile/undercodenews.bsky.social/post/3lgvt725em32useen2 months ago
automationCVE-2024-40891https://bsky.app/profile/rxerium.com/post/3lgvooz45zv2wseen2 months ago
automationCVE-2024-40891https://bsky.app/profile/undercodenews.bsky.social/post/3lgvnplpjdf23seen2 months ago
automationCVE-2024-40891https://www.darkreading.com/endpoint-security/unpatched-zyxel-cpe-zero-day-cyberattackersseen2 months ago
automationCVE-2024-40891https://bsky.app/profile/greynoise.bsky.social/post/3lgvhg52ba224seen2 months ago
automationCVE-2024-40891https://bsky.app/profile/greynoise.infosec.exchange.ap.brid.gy/post/3lgvhdxa2dsa2seen2 months ago
automationCVE-2024-40891https://bsky.app/profile/ntkramer.bsky.social/post/3lgvg5gw5ds2yseen2 months ago
automationCVE-2024-40891https://infosec.exchange/users/screaminggoat/statuses/113912632267283246seen2 months ago
automationCVE-2024-40891https://bsky.app/profile/helpnetsecurity.com/post/3lgvf6nio2k2qseen2 months ago
automationCVE-2024-40891https://bsky.app/profile/securityrss.bsky.social/post/3lgvchyusrb2gseen2 months ago
automationCVE-2024-40891https://bsky.app/profile/securityrss.bsky.social/post/3lgvavjm32z2tseen2 months ago
automationCVE-2024-40891https://infosec.exchange/users/threatcodex/statuses/113912176163030592seen2 months ago
automationCVE-2024-40891https://bsky.app/profile/bleepingcomputer.com/post/3lgv7d3anki2kseen2 months ago
automationCVE-2024-40891https://bsky.app/profile/jbhall56.bsky.social/post/3lguypoz66c2aseen2 months ago
automationCVE-2024-40891https://infosec.exchange/users/jbhall56/statuses/113911703057934783seen2 months ago
automationCVE-2024-40891https://bsky.app/profile/Zero-Trust.activitypub.awakari.com.ap.brid.gy/post/3lguwxbqz5vo2seen2 months ago
automationCVE-2024-40891https://bsky.app/profile/hackingne.ws/post/3lguj4tvui22yseen2 months ago
automationCVE-2024-40891https://bsky.app/profile/infosec.skyfleet.blue/post/3lgud57plki2useen2 months ago
automationCVE-2024-40891https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lgud4pcsc22nseen2 months ago
automationCVE-2024-40891https://bsky.app/profile/cti-news.bsky.social/post/3lgucdg5kq222seen2 months ago
automationCVE-2024-40891https://bsky.app/profile/techit.bsky.social/post/3lguc4oreva2cseen2 months ago
automationCVE-2024-40891https://thehackernews.com/2025/01/zyxel-cpe-devices-face-active.htmlseen2 months ago
automationCVE-2024-40891https://bsky.app/profile/bluecyber.bsky.social/post/3lgtiteaoks2hseen2 months ago
automationCVE-2024-40891https://bsky.app/profile/greynoise.infosec.exchange.ap.brid.gy/post/3lgtfi6arhdz2seen2 months ago
automationCVE-2024-40891https://infosec.exchange/users/iagox86/statuses/113908066147897929seen2 months ago
automationCVE-2024-40891https://bsky.app/profile/greynoise.bsky.social/post/3lgtep3hmh22oseen2 months ago
automationCVE-2024-40890https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lk6mo6iclbu2seen19 days ago
automationCVE-2024-40890https://poliverso.org/objects/0477a01e-80e54043-db8f11a3e9621a39seen23 days ago
automationCVE-2024-40890https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ljkk3nrarnc2seen27 days ago
automationCVE-2024-40890MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123seen1 month ago
automationCVE-2024-40890https://bsky.app/profile/cecallihelper.bsky.social/post/3li2opy5lts2eseen1 month ago
automationCVE-2024-40890https://bsky.app/profile/beikokucyber.bsky.social/post/3lhz32db7lf24seen1 month ago
automationCVE-2024-40890https://bsky.app/profile/getpokemon7.bsky.social/post/3lhy64f2p5c2aseen1 month ago
automationCVE-2024-40890MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123seen1 month ago
automationCVE-2024-40890https://bsky.app/profile/tmjintel.bsky.social/post/3lhwhtxfoek2fseen1 month ago
automationCVE-2024-40890https://infosec.exchange/users/screaminggoat/statuses/113986875105156497seen1 month ago
automationCVE-2024-40890https://feedsin.space/feed/CISAKevBot/items/3318897seen1 month ago
automationCVE-2024-40890https://bsky.app/profile/aakl.bsky.social/post/3lhwdpg4ohd2iseen1 month ago
automationCVE-2024-40890https://bsky.app/profile/aakl.bsky.social/post/3lhwdpg4ohc2iseen1 month ago
automationCVE-2024-40890https://bsky.app/profile/getpokemon7.bsky.social/post/3lhq5c2em2c2gseen1 month ago
automationCVE-2024-40890https://infosec.exchange/users/dragonjar/statuses/113967921473760296seen1 month ago
automationCVE-2024-40890https://bsky.app/profile/albinolobster0.bsky.social/post/3lhlq52gzjs2tseen1 month ago
automationCVE-2024-40890https://bsky.app/profile/beikokucyber.bsky.social/post/3lhjybyrfu32rseen1 month ago
cedricCVE-2024-40890https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025seen1 month ago
automationCVE-2024-40890https://bsky.app/profile/securityrss.bsky.social/post/3lhh4dw23ox25seen1 month ago
automationCVE-2024-40890https://bsky.app/profile/hackingne.ws/post/3lhf2uzvjnw2sseen1 month ago
automationCVE-2024-40890https://infosec.exchange/users/screaminggoat/statuses/113946527318610149seen1 month ago
automationCVE-2024-40890https://bsky.app/profile/cve.skyfleet.blue/post/3lhdywevgor2useen1 month ago
automationCVE-2024-40890https://mastodon.social/users/CyberSignaler/statuses/113945220897786957seen1 month ago
automationCVE-2024-40890https://bsky.app/profile/cve-notifications.bsky.social/post/3lhdt77u4sx2hseen1 month ago
automationCVE-2024-40890https://infosec.exchange/users/cve/statuses/113945027452629017seen1 month ago