Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11667: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Zyxel ATP series firmware

0
High
VulnerabilityCVE-2024-11667cvecve-2024-11667cwe-22
Published: Wed Nov 27 2024 (11/27/2024, 09:39:41 UTC)
Source: CVE Database V5
Vendor/Project: Zyxel
Product: ATP series firmware

Description

A directory traversal vulnerability in the web management interface of Zyxel ATP series firmware versions V5.00 through V5.38, USG FLEX series firmware versions V5.00 through V5.38, USG FLEX 50(W) series firmware versions V5.10 through V5.38, and USG20(W)-VPN series firmware versions V5.10 through V5.38 could allow an attacker to download or upload files via a crafted URL.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 11:31:20 UTC

Technical Analysis

CVE-2024-11667 is a directory traversal vulnerability categorized under CWE-22, found in the web management interface of multiple Zyxel firewall and security appliance firmware versions (ATP series, USG FLEX series, USG FLEX 50(W), and USG20(W)-VPN series) ranging from V5.00 to V5.38. The vulnerability arises due to improper validation and limitation of pathname inputs, allowing attackers to manipulate URL parameters to traverse directories beyond the intended restricted scope. This enables unauthorized download or upload of arbitrary files on the device's filesystem. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network, increasing its risk profile. The CVSS v3.1 base score is 7.5, reflecting high severity primarily due to the impact on confidentiality and the ease of exploitation. While no public exploits have been reported yet, the flaw could lead to exposure of sensitive configuration files, credentials, or other critical data stored on the device, potentially facilitating further attacks or data breaches. The affected Zyxel devices are widely used in enterprise and SMB environments for network security, making this vulnerability a significant threat vector. No official patches or mitigation links were provided at the time of disclosure, emphasizing the need for immediate vendor updates or temporary workarounds.

Potential Impact

The primary impact of CVE-2024-11667 is the compromise of confidentiality through unauthorized access to sensitive files on affected Zyxel devices. Attackers can download configuration files, logs, or other critical data, potentially exposing credentials, network topology, or security policies. Additionally, the ability to upload files may allow attackers to place malicious scripts or backdoors, leading to further compromise or persistent access. Although integrity and availability are not directly impacted, the exposure of sensitive information can facilitate subsequent attacks such as lateral movement, privilege escalation, or data exfiltration. Organizations relying on these Zyxel devices for perimeter security, VPN access, or firewall functions may face increased risk of network intrusion and data breaches. The vulnerability's remote and unauthenticated nature significantly broadens the attack surface, making it a critical concern for enterprises, government agencies, and service providers worldwide. The absence of known exploits in the wild currently limits immediate widespread impact, but the potential for rapid weaponization remains high.

Mitigation Recommendations

Organizations should prioritize upgrading affected Zyxel firmware to versions beyond V5.38 once vendor patches become available. Until official patches are released, network administrators should restrict access to the web management interface by implementing IP whitelisting, VPN-only access, or network segmentation to limit exposure to trusted management hosts. Disabling remote web management interfaces where feasible can reduce attack vectors. Monitoring network traffic for suspicious URL patterns or unusual file transfer activity related to the management interface is recommended. Employing Web Application Firewalls (WAFs) with custom rules to detect and block directory traversal attempts can provide interim protection. Regularly auditing device configurations and access logs will help identify potential exploitation attempts early. Additionally, organizations should maintain an incident response plan tailored to network device compromise scenarios and ensure backups of device configurations are securely stored. Collaboration with Zyxel support for timely updates and advisories is essential to maintain security posture.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Zyxel
Date Reserved
2024-11-25T07:15:56.063Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b0247d717aace268a9

Added to database: 10/21/2025, 7:06:24 PM

Last enriched: 2/28/2026, 11:31:20 AM

Last updated: 3/25/2026, 7:46:23 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses