CVE-2025-11846: CWE-476 NULL Pointer Dereference in Zyxel VMG3625-T50B firmware
CVE-2025-11846 is a medium-severity null pointer dereference vulnerability affecting Zyxel VMG3625-T50B and WX3100-T0 firmware versions up to 5. 50(ABPM. 9. 6)C0 and 5. 50(ABVL. 4. 8)C0 respectively. The flaw exists in the account settings CGI program and can be exploited by an authenticated attacker with administrator privileges to cause a denial-of-service (DoS) condition by sending a crafted HTTP request. This vulnerability does not impact confidentiality or integrity but results in service disruption. Exploitation requires high privileges and no user interaction.
AI Analysis
Technical Summary
CVE-2025-11846 is a null pointer dereference vulnerability categorized under CWE-476 found in the account settings CGI program of Zyxel VMG3625-T50B and WX3100-T0 firmware versions up to 5.50(ABPM.9.6)C0 and 5.50(ABVL.4.8)C0 respectively. The vulnerability arises when an authenticated attacker with administrator privileges sends a specially crafted HTTP request to the affected CGI endpoint, causing the firmware to dereference a null pointer. This leads to a denial-of-service (DoS) condition, effectively crashing or rebooting the device and disrupting network services. The vulnerability does not allow unauthorized access or data manipulation but impacts availability. The CVSS v3.1 base score is 4.9, reflecting medium severity due to the requirement for administrative privileges and the lack of confidentiality or integrity impact. No user interaction is needed, and the attack vector is network-based, making exploitation feasible within the administrative network scope. No public exploits or patches have been published at this time, but the vulnerability has been officially assigned and disclosed by Zyxel. The flaw highlights the importance of robust input validation and error handling in embedded device firmware, especially in management interfaces exposed to network administrators.
Potential Impact
The primary impact of CVE-2025-11846 is a denial-of-service condition on affected Zyxel devices, which can disrupt network connectivity and availability for organizations relying on these routers or gateways. This can affect enterprise networks, ISPs, and critical infrastructure sectors that use Zyxel VMG3625-T50B or WX3100-T0 devices for internet access or internal network routing. The DoS could lead to downtime, loss of productivity, and potential cascading failures in dependent systems. Since exploitation requires administrator-level access, the threat is mainly from insider attackers or attackers who have already compromised administrative credentials. The lack of confidentiality or integrity impact limits the risk of data breaches or unauthorized data modification. However, the disruption of network services can have significant operational consequences, especially in environments where continuous connectivity is critical. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future exploitation once the vulnerability becomes widely known.
Mitigation Recommendations
To mitigate CVE-2025-11846, organizations should implement the following specific measures: 1) Restrict administrative access to Zyxel devices to trusted personnel and secure management networks using strong authentication and network segmentation. 2) Monitor administrative access logs for unusual activity that could indicate attempts to exploit the vulnerability. 3) Apply firmware updates from Zyxel as soon as they become available to address this vulnerability. 4) If immediate patching is not possible, consider temporarily disabling or restricting access to the vulnerable CGI account settings interface to prevent exploitation. 5) Employ network-level protections such as firewalls or intrusion prevention systems to limit access to device management interfaces from untrusted networks. 6) Conduct regular security audits and vulnerability assessments on network devices to identify and remediate similar issues proactively. 7) Educate administrators on the risks of privilege misuse and the importance of safeguarding credentials to prevent insider threats.
Affected Countries
United States, Germany, France, United Kingdom, Japan, South Korea, Australia, Canada, Brazil, India
CVE-2025-11846: CWE-476 NULL Pointer Dereference in Zyxel VMG3625-T50B firmware
Description
CVE-2025-11846 is a medium-severity null pointer dereference vulnerability affecting Zyxel VMG3625-T50B and WX3100-T0 firmware versions up to 5. 50(ABPM. 9. 6)C0 and 5. 50(ABVL. 4. 8)C0 respectively. The flaw exists in the account settings CGI program and can be exploited by an authenticated attacker with administrator privileges to cause a denial-of-service (DoS) condition by sending a crafted HTTP request. This vulnerability does not impact confidentiality or integrity but results in service disruption. Exploitation requires high privileges and no user interaction.
AI-Powered Analysis
Technical Analysis
CVE-2025-11846 is a null pointer dereference vulnerability categorized under CWE-476 found in the account settings CGI program of Zyxel VMG3625-T50B and WX3100-T0 firmware versions up to 5.50(ABPM.9.6)C0 and 5.50(ABVL.4.8)C0 respectively. The vulnerability arises when an authenticated attacker with administrator privileges sends a specially crafted HTTP request to the affected CGI endpoint, causing the firmware to dereference a null pointer. This leads to a denial-of-service (DoS) condition, effectively crashing or rebooting the device and disrupting network services. The vulnerability does not allow unauthorized access or data manipulation but impacts availability. The CVSS v3.1 base score is 4.9, reflecting medium severity due to the requirement for administrative privileges and the lack of confidentiality or integrity impact. No user interaction is needed, and the attack vector is network-based, making exploitation feasible within the administrative network scope. No public exploits or patches have been published at this time, but the vulnerability has been officially assigned and disclosed by Zyxel. The flaw highlights the importance of robust input validation and error handling in embedded device firmware, especially in management interfaces exposed to network administrators.
Potential Impact
The primary impact of CVE-2025-11846 is a denial-of-service condition on affected Zyxel devices, which can disrupt network connectivity and availability for organizations relying on these routers or gateways. This can affect enterprise networks, ISPs, and critical infrastructure sectors that use Zyxel VMG3625-T50B or WX3100-T0 devices for internet access or internal network routing. The DoS could lead to downtime, loss of productivity, and potential cascading failures in dependent systems. Since exploitation requires administrator-level access, the threat is mainly from insider attackers or attackers who have already compromised administrative credentials. The lack of confidentiality or integrity impact limits the risk of data breaches or unauthorized data modification. However, the disruption of network services can have significant operational consequences, especially in environments where continuous connectivity is critical. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future exploitation once the vulnerability becomes widely known.
Mitigation Recommendations
To mitigate CVE-2025-11846, organizations should implement the following specific measures: 1) Restrict administrative access to Zyxel devices to trusted personnel and secure management networks using strong authentication and network segmentation. 2) Monitor administrative access logs for unusual activity that could indicate attempts to exploit the vulnerability. 3) Apply firmware updates from Zyxel as soon as they become available to address this vulnerability. 4) If immediate patching is not possible, consider temporarily disabling or restricting access to the vulnerable CGI account settings interface to prevent exploitation. 5) Employ network-level protections such as firewalls or intrusion prevention systems to limit access to device management interfaces from untrusted networks. 6) Conduct regular security audits and vulnerability assessments on network devices to identify and remediate similar issues proactively. 7) Educate administrators on the risks of privilege misuse and the importance of safeguarding credentials to prevent insider threats.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Zyxel
- Date Reserved
- 2025-10-16T09:31:00.608Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699d06cabe58cf853b07ca60
Added to database: 2/24/2026, 2:02:50 AM
Last enriched: 2/24/2026, 2:17:12 AM
Last updated: 2/24/2026, 6:15:17 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24314: CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere in SAP_SE S/4HANA (Manage Payment Media)
MediumCVE-2026-3070: Cross Site Scripting in SourceCodester Modern Image Gallery App
MediumCVE-2026-3069: SQL Injection in itsourcecode Document Management System
MediumCVE-2026-3068: SQL Injection in itsourcecode Document Management System
MediumCVE-2026-3067: Path Traversal in HummerRisk
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.