Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13942: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Zyxel EX3510-B0 firmware

0
Critical
VulnerabilityCVE-2025-13942cvecve-2025-13942cwe-78
Published: Tue Feb 24 2026 (02/24/2026, 02:32:18 UTC)
Source: CVE Database V5
Vendor/Project: Zyxel
Product: EX3510-B0 firmware

Description

A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 firmware versions through 5.17(ABUP.15.1)C0 could allow a remote attacker to execute operating system (OS) commands on an affected device by sending specially crafted UPnP SOAP requests.

AI-Powered Analysis

AILast updated: 02/24/2026, 03:17:18 UTC

Technical Analysis

CVE-2025-13942 is an OS command injection vulnerability classified under CWE-78, affecting the Universal Plug and Play (UPnP) service in Zyxel EX3510-B0 firmware versions up to 5.17(ABUP.15.1)C0. The vulnerability arises from improper neutralization of special elements in UPnP SOAP requests, allowing an attacker to inject and execute arbitrary operating system commands remotely. Exploitation requires no authentication or user interaction, and the attack vector is network-based, making it highly accessible to remote attackers. The flaw enables full compromise of the affected device, potentially allowing attackers to manipulate device configurations, intercept or redirect network traffic, deploy malware, or use the device as a pivot point for further network intrusion. The vulnerability has a CVSS 3.1 base score of 9.8, indicating critical severity with high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the nature of the vulnerability and the widespread use of Zyxel devices in enterprise and ISP environments make this a significant threat. The lack of available patches at the time of disclosure necessitates immediate risk mitigation through network segmentation, UPnP access restrictions, and monitoring for anomalous UPnP traffic.

Potential Impact

The impact of CVE-2025-13942 is severe for organizations worldwide using Zyxel EX3510-B0 devices. Successful exploitation can lead to complete device takeover, compromising network security and potentially allowing attackers to intercept sensitive data, disrupt network services, or launch further attacks within the internal network. This can result in data breaches, service outages, and loss of trust. Critical infrastructure providers, ISPs, and enterprises relying on these devices for network connectivity and management are particularly at risk. The vulnerability's ease of exploitation without authentication or user interaction increases the likelihood of automated attacks and wormable scenarios. Additionally, compromised devices could be leveraged in botnets or for lateral movement, amplifying the threat's reach and impact. The absence of known exploits currently provides a narrow window for proactive defense before active exploitation emerges.

Mitigation Recommendations

Organizations should immediately restrict UPnP traffic to and from Zyxel EX3510-B0 devices by implementing network segmentation and firewall rules that limit access to trusted management networks only. Disable UPnP functionality if it is not essential for operations. Monitor network traffic for unusual or malformed UPnP SOAP requests that could indicate exploitation attempts. Employ intrusion detection/prevention systems (IDS/IPS) with signatures targeting UPnP command injection patterns. Coordinate with Zyxel for timely firmware updates and apply patches as soon as they become available. In the interim, consider deploying virtual patching via network security appliances to block malicious payloads targeting this vulnerability. Conduct thorough audits of affected devices to detect signs of compromise and maintain robust incident response plans tailored to network device breaches. Educate network administrators on the risks of exposed UPnP services and enforce strict access controls.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Zyxel
Date Reserved
2025-12-03T05:28:13.264Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699d14d6be58cf853b182c20

Added to database: 2/24/2026, 3:02:46 AM

Last enriched: 2/24/2026, 3:17:18 AM

Last updated: 2/25/2026, 12:14:32 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats