Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6265: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Zyxel NWA50AX PRO firmware

0
High
VulnerabilityCVE-2025-6265cvecve-2025-6265cwe-22
Published: Tue Jul 15 2025 (07/15/2025, 01:32:10 UTC)
Source: CVE Database V5
Vendor/Project: Zyxel
Product: NWA50AX PRO firmware

Description

A path traversal vulnerability in the file_upload-cgi CGI program of Zyxel NWA50AX PRO firmware version 7.10(ACGE.2) and earlier could allow an authenticated attacker with administrator privileges to access specific directories and delete files, such as the configuration file, on the affected device.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:11:01 UTC

Technical Analysis

CVE-2025-6265 is a path traversal vulnerability categorized under CWE-22, found in the file_upload-cgi CGI program of Zyxel NWA50AX PRO firmware versions 7.10(ACGE.2) and earlier. The vulnerability allows an attacker who has authenticated with administrator privileges to manipulate file paths improperly restricted by the application, enabling access to directories outside the intended upload directory. This can lead to unauthorized deletion of files, including critical configuration files, potentially causing device misconfiguration or denial of service. The flaw stems from insufficient validation and sanitization of user-supplied pathname inputs, allowing traversal sequences (e.g., ../) to escape the restricted directory context. The CVSS 3.1 base score of 7.2 reflects a high severity due to the network attack vector, low attack complexity, requirement for high privileges, and impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild, the vulnerability poses a significant risk to organizations relying on these devices for network access points. The attacker must have administrator credentials, which limits exploitation to insiders or attackers who have compromised admin accounts. The vulnerability highlights the importance of secure input validation in CGI programs handling file operations on embedded devices.

Potential Impact

The vulnerability can severely impact organizations by enabling attackers with administrative access to delete critical files, such as configuration files, on Zyxel NWA50AX PRO devices. This can lead to device misconfiguration, loss of network access, and potential denial of service, disrupting business operations. Confidentiality is at risk as attackers may access restricted directories, potentially exposing sensitive data. Integrity is compromised through unauthorized file deletions or modifications, and availability is affected due to possible device outages or forced reconfiguration. Since the vulnerability requires administrator privileges, the threat is elevated in environments where credential compromise or insider threats are possible. The widespread use of Zyxel access points in enterprise, government, and critical infrastructure networks means that exploitation could have cascading effects on network security and operational continuity. The lack of known exploits currently reduces immediate risk but does not eliminate the potential for future attacks, especially if attackers develop automated tools.

Mitigation Recommendations

Organizations should immediately audit and restrict administrative access to Zyxel NWA50AX PRO devices, ensuring that only trusted personnel can authenticate with administrator privileges. Network segmentation and access controls should be enforced to limit exposure of management interfaces. Monitoring and logging of administrative actions can help detect suspicious activity. Since no official patches are currently available, organizations should contact Zyxel for firmware updates and apply them promptly once released. As a temporary measure, disable or restrict access to the vulnerable file_upload-cgi CGI program if possible. Employ strong password policies and multi-factor authentication to reduce the risk of credential compromise. Regular backups of device configurations should be maintained to enable rapid recovery in case of file deletion or device misconfiguration. Finally, consider deploying network intrusion detection systems tuned to detect anomalous file access or deletion attempts on these devices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Zyxel
Date Reserved
2025-06-19T03:32:47.838Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6875b667a83201eaaccc25e4

Added to database: 7/15/2025, 2:01:11 AM

Last enriched: 2/27/2026, 4:11:01 AM

Last updated: 3/22/2026, 4:18:34 PM

Views: 182

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses