CVE-2025-11730: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Zyxel ATP series firmware
CVE-2025-11730 is a high-severity post-authentication OS command injection vulnerability affecting Zyxel ATP, USG FLEX, and USG VPN series firmware versions 5. 35 through 5. 41. An attacker with administrator privileges can exploit a flaw in the Dynamic DNS (DDNS) CLI command by supplying a crafted argument, enabling arbitrary OS command execution. This vulnerability impacts confidentiality, integrity, and availability of affected devices. No public exploits are currently known. European organizations using these Zyxel devices, especially in critical network infrastructure, face significant risk. Mitigation requires immediate firmware updates once patches are released and restricting administrative access. Countries with high Zyxel market penetration and strategic network infrastructure reliance are most at risk. The CVSS score of 7.
AI Analysis
Technical Summary
CVE-2025-11730 is a command injection vulnerability classified under CWE-78, discovered in Zyxel ATP series firmware and related USG FLEX and USG VPN series firmware versions 5.35 through 5.41. The flaw exists in the Dynamic DNS (DDNS) configuration CLI command, which improperly neutralizes special characters in user-supplied input. An authenticated attacker with administrator privileges can exploit this by providing a specially crafted string as an argument to the DDNS CLI command, resulting in arbitrary OS command execution on the device. This can lead to full compromise of the affected device, allowing attackers to manipulate device configurations, exfiltrate sensitive data, disrupt network traffic, or pivot to internal networks. The vulnerability requires no user interaction beyond authentication but does require elevated privileges, limiting exploitation to insiders or attackers who have already compromised administrative credentials. The CVSS v3.1 base score of 7.2 indicates a high severity due to network attack vector, low attack complexity, and high impact on confidentiality, integrity, and availability. Although no exploits are publicly known, the vulnerability poses a significant risk given the critical role of these devices in enterprise and service provider networks. The lack of available patches at the time of reporting necessitates immediate risk mitigation through access restrictions and monitoring.
Potential Impact
For European organizations, this vulnerability poses a significant threat to network security and operational continuity. Zyxel ATP and USG series devices are commonly deployed as firewalls, VPN gateways, and unified threat management appliances in enterprises, government agencies, and critical infrastructure sectors. Successful exploitation could allow attackers to gain persistent control over these devices, leading to data breaches, network disruptions, and lateral movement within internal networks. Confidentiality is at risk due to potential data exfiltration; integrity is compromised through unauthorized configuration changes; and availability may be impacted by denial-of-service conditions or device manipulation. The requirement for administrator privileges reduces the risk from external attackers but increases the threat from insider threats or credential compromise. Given the strategic importance of network perimeter devices, the impact on European organizations could be severe, especially in sectors like finance, energy, healthcare, and public administration.
Mitigation Recommendations
1. Immediately restrict administrative access to Zyxel ATP, USG FLEX, and USG VPN devices to trusted personnel and secure management networks. 2. Implement multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. 3. Monitor CLI command usage and logs for unusual or unauthorized DDNS configuration commands indicative of exploitation attempts. 4. Segment management interfaces from general network access to limit exposure. 5. Regularly audit administrative accounts and remove or disable unused or default accounts. 6. Once Zyxel releases firmware patches addressing CVE-2025-11730, prioritize prompt testing and deployment of these updates. 7. Employ network intrusion detection systems (NIDS) tuned to detect anomalous command injection patterns or unusual traffic from these devices. 8. Educate administrators about the risks of command injection vulnerabilities and the importance of secure credential management. 9. Consider temporary compensating controls such as disabling DDNS features if not required until patches are available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-11730: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Zyxel ATP series firmware
Description
CVE-2025-11730 is a high-severity post-authentication OS command injection vulnerability affecting Zyxel ATP, USG FLEX, and USG VPN series firmware versions 5. 35 through 5. 41. An attacker with administrator privileges can exploit a flaw in the Dynamic DNS (DDNS) CLI command by supplying a crafted argument, enabling arbitrary OS command execution. This vulnerability impacts confidentiality, integrity, and availability of affected devices. No public exploits are currently known. European organizations using these Zyxel devices, especially in critical network infrastructure, face significant risk. Mitigation requires immediate firmware updates once patches are released and restricting administrative access. Countries with high Zyxel market penetration and strategic network infrastructure reliance are most at risk. The CVSS score of 7.
AI-Powered Analysis
Technical Analysis
CVE-2025-11730 is a command injection vulnerability classified under CWE-78, discovered in Zyxel ATP series firmware and related USG FLEX and USG VPN series firmware versions 5.35 through 5.41. The flaw exists in the Dynamic DNS (DDNS) configuration CLI command, which improperly neutralizes special characters in user-supplied input. An authenticated attacker with administrator privileges can exploit this by providing a specially crafted string as an argument to the DDNS CLI command, resulting in arbitrary OS command execution on the device. This can lead to full compromise of the affected device, allowing attackers to manipulate device configurations, exfiltrate sensitive data, disrupt network traffic, or pivot to internal networks. The vulnerability requires no user interaction beyond authentication but does require elevated privileges, limiting exploitation to insiders or attackers who have already compromised administrative credentials. The CVSS v3.1 base score of 7.2 indicates a high severity due to network attack vector, low attack complexity, and high impact on confidentiality, integrity, and availability. Although no exploits are publicly known, the vulnerability poses a significant risk given the critical role of these devices in enterprise and service provider networks. The lack of available patches at the time of reporting necessitates immediate risk mitigation through access restrictions and monitoring.
Potential Impact
For European organizations, this vulnerability poses a significant threat to network security and operational continuity. Zyxel ATP and USG series devices are commonly deployed as firewalls, VPN gateways, and unified threat management appliances in enterprises, government agencies, and critical infrastructure sectors. Successful exploitation could allow attackers to gain persistent control over these devices, leading to data breaches, network disruptions, and lateral movement within internal networks. Confidentiality is at risk due to potential data exfiltration; integrity is compromised through unauthorized configuration changes; and availability may be impacted by denial-of-service conditions or device manipulation. The requirement for administrator privileges reduces the risk from external attackers but increases the threat from insider threats or credential compromise. Given the strategic importance of network perimeter devices, the impact on European organizations could be severe, especially in sectors like finance, energy, healthcare, and public administration.
Mitigation Recommendations
1. Immediately restrict administrative access to Zyxel ATP, USG FLEX, and USG VPN devices to trusted personnel and secure management networks. 2. Implement multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. 3. Monitor CLI command usage and logs for unusual or unauthorized DDNS configuration commands indicative of exploitation attempts. 4. Segment management interfaces from general network access to limit exposure. 5. Regularly audit administrative accounts and remove or disable unused or default accounts. 6. Once Zyxel releases firmware patches addressing CVE-2025-11730, prioritize prompt testing and deployment of these updates. 7. Employ network intrusion detection systems (NIDS) tuned to detect anomalous command injection patterns or unusual traffic from these devices. 8. Educate administrators about the risks of command injection vulnerabilities and the importance of secure credential management. 9. Consider temporary compensating controls such as disabling DDNS features if not required until patches are available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Zyxel
- Date Reserved
- 2025-10-14T02:35:13.097Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6983fd2df9fa50a62fcc4d89
Added to database: 2/5/2026, 2:15:09 AM
Last enriched: 2/5/2026, 2:29:31 AM
Last updated: 2/5/2026, 5:30:43 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61732: CWE-94: Improper Control of Generation of Code ('Code Injection') in Go toolchain cmd/cgo
HighCVE-2025-10314: CWE-276 Incorrect Default Permissions in Mitsubishi Electric Corporation FREQSHIP-mini for Windows
HighCVE-2026-1898: Improper Access Controls in WeKan
MediumCVE-2026-1897: Missing Authorization in WeKan
MediumCVE-2026-1896: Improper Access Controls in WeKan
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.