EXECUTIVE SUMMARY:
A vulnerability in multiple Zyxel networking devices including 4G 5G CPEs, DSL Ethernet routers, Fiber ONTs, and wireless extenders has been identified that allows remote attackers to execute arbitrary operating system commands on affected products via a flaw in the Universal Plug and Play (UPnP) service. The issue stems from improper input handling in the UPnP SOAP request processing, which can be exploited without authentication if both WAN access and UPnP are manually enabled on the device. Successful exploitation could lead to full device compromise, enabling attackers to manipulate network traffic, deploy further malware, pivot deeper into local networks, or disrupt services. Zyxel has released firmware updates to address this and additional command injection and information‑disclosure bugs, and affected users are advised to apply patches immediately, disable unused UPnP and WAN services, and enforce strong credentials to mitigate risk.[/subscribe_to_unlock_form]
EXECUTIVE SUMMARY:
A vulnerability in multiple Zyxel networking devices including 4G 5G CPEs, DSL Ethernet routers, Fiber ONTs, and wireless extenders has been identified that allows remote attackers to execute arbitrary operating system commands on affected products via a flaw in the Universal Plug and Play (UPnP) service. The issue stems from improper input handling in the UPnP SOAP request processing, which can be exploited without authentication if both WAN access and UPnP are manually enabled on the device. Successful exploitation could lead to full device compromise, enabling attackers to manipulate network traffic, deploy further malware, pivot deeper into local networks, or disrupt services. Zyxel has released firmware updates to address this and additional command injection and information‑disclosure bugs, and affected users are advised to apply patches immediately, disable unused UPnP and WAN services, and enforce strong credentials to mitigate risk.[emaillocker id="1283"]
RECOMMENDATION
REFERENCES:
The following reports contain further technical details:
[/emaillocker]