Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7673: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Zyxel VMG8825-T50K firmware

0
Critical
VulnerabilityCVE-2025-7673cvecve-2025-7673cwe-120
Published: Wed Jul 16 2025 (07/16/2025, 07:11:02 UTC)
Source: CVE Database V5
Vendor/Project: Zyxel
Product: VMG8825-T50K firmware

Description

A buffer overflow vulnerability in the URL parser of the zhttpd web server in Zyxel VMG8825-T50K firmware versions prior to V5.50(ABOM.5)C0 could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and potentially execute arbitrary code by sending a specially crafted HTTP request.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:17:29 UTC

Technical Analysis

CVE-2025-7673 identifies a critical security vulnerability classified as CWE-120 (Classic Buffer Overflow) in the Zyxel VMG8825-T50K router firmware, specifically in the zhttpd web server's URL parser. The vulnerability exists because the code copies input data into a buffer without verifying that the input size fits within the buffer's allocated memory, leading to a buffer overflow condition. An attacker can exploit this by sending a specially crafted HTTP request containing an overly long or malformed URL, which causes the overflow. This can result in memory corruption, enabling denial-of-service conditions by crashing the web server or the entire device. More severely, it may allow remote code execution (RCE) with the privileges of the web server process, potentially leading to full device compromise. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The affected firmware versions are all prior to V5.50(ABOM.5)C0, and no patch links are currently provided, though the vendor has published the advisory. The CVSS v3.1 base score is 9.8, reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. While no active exploits have been observed in the wild, the vulnerability's nature and severity make it a prime target for attackers once exploit code becomes available.

Potential Impact

The impact of CVE-2025-7673 on organizations worldwide is significant. Exploitation can lead to complete compromise of affected Zyxel VMG8825-T50K devices, which are commonly used as residential gateways, small office routers, or ISP-provided CPE (Customer Premises Equipment). A successful attack could allow adversaries to disrupt network connectivity via denial-of-service, intercept or manipulate network traffic, or pivot into internal networks by executing arbitrary code on the device. This undermines network security, confidentiality of communications, and availability of internet services. Enterprises relying on these devices for critical connectivity or security functions may face operational disruptions and data breaches. The vulnerability's remote, unauthenticated nature increases the risk of widespread exploitation, especially in environments with exposed management interfaces or insufficient network segmentation. The lack of known exploits currently provides a window for proactive mitigation, but the potential for rapid weaponization is high given the vulnerability's characteristics.

Mitigation Recommendations

To mitigate CVE-2025-7673, organizations should prioritize upgrading the Zyxel VMG8825-T50K firmware to version V5.50(ABOM.5)C0 or later once available from Zyxel, as this will contain the necessary fixes to prevent buffer overflow exploitation. Until patches are applied, network administrators should restrict access to the device's web management interface by implementing network segmentation and firewall rules that limit HTTP access to trusted internal IP addresses only. Disabling remote management over HTTP or HTTPS on the affected devices can reduce exposure. Monitoring network traffic for anomalous HTTP requests with unusually long or malformed URLs may help detect attempted exploitation. Additionally, organizations should consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures targeting buffer overflow attempts against Zyxel devices. Regularly auditing device firmware versions and maintaining an inventory of vulnerable hardware will support timely remediation. Finally, educating users and administrators about the risks of exposed management interfaces and enforcing strong network security policies will reduce attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Zyxel
Date Reserved
2025-07-15T02:01:55.637Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 687751bba83201eaacd46d74

Added to database: 7/16/2025, 7:16:11 AM

Last enriched: 2/27/2026, 4:17:29 AM

Last updated: 3/24/2026, 5:41:01 PM

Views: 248

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses