Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12010: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Zyxel AX7501-B1 firmware

0
High
VulnerabilityCVE-2024-12010cvecve-2024-12010cwe-78
Published: Tue Mar 11 2025 (03/11/2025, 01:44:15 UTC)
Source: CVE Database V5
Vendor/Project: Zyxel
Product: AX7501-B1 firmware

Description

A post-authentication command injection vulnerability in the ”zyUtilMailSend” function of the Zyxel AX7501-B1 firmware version V5.17(ABPC.5.3)C0 and earlier could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on a vulnerable device.

AI-Powered Analysis

AILast updated: 02/26/2026, 21:45:46 UTC

Technical Analysis

CVE-2024-12010 identifies an OS command injection vulnerability classified under CWE-78 in the Zyxel AX7501-B1 firmware, specifically in the zyUtilMailSend function. This vulnerability exists in firmware versions V5.17(ABPC.5.3)C0 and earlier. The flaw allows an attacker with authenticated administrator privileges to inject and execute arbitrary operating system commands on the affected device. The vulnerability is post-authentication, meaning the attacker must first gain administrative access, but once authenticated, the attack complexity is low due to improper neutralization of special elements in command inputs. The CVSS v3.1 base score is 7.2, reflecting high severity with network attack vector, low complexity, high privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Exploitation could lead to full device compromise, enabling attackers to manipulate device configurations, intercept or redirect network traffic, or disrupt device operations. No known public exploits or patches are currently available, increasing the urgency for affected organizations to implement compensating controls. The vulnerability highlights the risks of insufficient input validation in embedded device firmware, which can be leveraged to gain persistent footholds in network infrastructure.

Potential Impact

The impact of CVE-2024-12010 is significant for organizations using Zyxel AX7501-B1 devices, particularly in enterprise, ISP, and critical infrastructure environments. Successful exploitation can lead to complete compromise of the device, allowing attackers to execute arbitrary commands with administrative privileges. This can result in unauthorized access to sensitive network data, manipulation or disruption of network traffic, and potential pivoting to other internal systems. The confidentiality, integrity, and availability of network services relying on these devices are at risk. Given the device’s role in network management and communication, exploitation could cause widespread operational disruptions. The lack of known exploits in the wild currently limits immediate risk, but the vulnerability’s characteristics make it a prime target once exploit code becomes available. Organizations without timely mitigation may face increased exposure to targeted attacks or automated scanning campaigns. The vulnerability also poses risks to supply chain security where these devices are deployed at scale.

Mitigation Recommendations

1. Immediately restrict administrative access to Zyxel AX7501-B1 devices to trusted personnel and secure management interfaces using strong authentication methods such as multifactor authentication. 2. Monitor device logs and network traffic for unusual command execution patterns or unauthorized administrative activities. 3. Implement network segmentation to isolate vulnerable devices from critical network segments and limit exposure to potential attackers. 4. Disable or restrict the functionality of the zyUtilMailSend feature if possible until a vendor patch is released. 5. Regularly check Zyxel’s official channels for firmware updates addressing this vulnerability and apply patches promptly once available. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting command injection attempts targeting Zyxel devices. 7. Conduct periodic security audits and penetration tests focusing on device firmware vulnerabilities and administrative access controls. 8. Educate administrators on the risks of command injection vulnerabilities and the importance of secure device management practices. These steps go beyond generic advice by focusing on access control hardening, feature restriction, and proactive monitoring tailored to this specific vulnerability context.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Zyxel
Date Reserved
2024-12-02T09:10:54.073Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a43a85912abc71d62099

Added to database: 2/26/2026, 7:51:22 PM

Last enriched: 2/26/2026, 9:45:46 PM

Last updated: 2/26/2026, 11:16:37 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses