Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8078: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Zyxel ATP series firmware

0
High
VulnerabilityCVE-2025-8078cvecve-2025-8078cwe-78
Published: Tue Oct 21 2025 (10/21/2025, 01:49:29 UTC)
Source: CVE Database V5
Vendor/Project: Zyxel
Product: ATP series firmware

Description

A post-authentication command injection vulnerability in Zyxel ATP series firmware versions from V4.32 through V5.40, USG FLEX series firmware versions from V4.50 through V5.40, USG FLEX 50(W) series firmware versions from V4.16 through V5.40, and USG20(W)-VPN series firmware versions from V4.16 through V5.40 could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on the affected device by passing a crafted string as an argument to a CLI command.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:22:22 UTC

Technical Analysis

CVE-2025-8078 is an OS command injection vulnerability classified under CWE-78, found in Zyxel ATP series firmware versions V4.32 through V5.40, USG FLEX series firmware versions V4.50 through V5.40, USG FLEX 50(W) series firmware versions V4.16 through V5.40, and USG20(W)-VPN series firmware versions V4.16 through V5.40. The vulnerability arises from improper neutralization of special elements in user-supplied input passed to operating system commands within the device's CLI interface. An attacker with authenticated administrator privileges can exploit this flaw by submitting crafted strings as arguments to CLI commands, resulting in arbitrary OS command execution. This can lead to full device compromise, including unauthorized access to sensitive data, modification or disruption of device functionality, and potential pivoting into internal networks. The CVSS v3.1 base score is 7.2, indicating high severity, with attack vector network-based, low attack complexity, requiring high privileges but no user interaction, and impacting confidentiality, integrity, and availability. No public exploits have been reported yet, but the vulnerability is critical due to the privileged access required and the potential for complete device takeover. The flaw affects widely deployed Zyxel firewall and VPN products commonly used in enterprise and service provider environments, making timely patching and access control essential.

Potential Impact

The impact of CVE-2025-8078 is significant for organizations using affected Zyxel devices as it allows an authenticated administrator to execute arbitrary OS commands, effectively compromising the device. This can lead to unauthorized disclosure of sensitive information, modification or deletion of configuration and logs, disruption of network security services such as firewalling and VPN, and potential lateral movement within the network. Given these devices often serve as perimeter security gateways, their compromise can expose entire internal networks to attackers. The vulnerability affects confidentiality, integrity, and availability, potentially resulting in data breaches, service outages, and loss of trust. Organizations relying on these devices for critical infrastructure protection or regulatory compliance face increased risk of operational disruption and legal consequences if exploited.

Mitigation Recommendations

To mitigate CVE-2025-8078, organizations should: 1) Monitor Zyxel's official channels for firmware updates addressing this vulnerability and apply patches promptly once released. 2) Restrict administrative access to the devices by enforcing strong authentication mechanisms, such as multi-factor authentication, and limiting access to trusted IP addresses or management networks. 3) Regularly audit and monitor administrative activities and CLI command usage to detect suspicious behavior indicative of exploitation attempts. 4) Employ network segmentation to isolate management interfaces from general user networks, reducing exposure. 5) Consider deploying additional security controls such as intrusion detection/prevention systems to identify anomalous command execution patterns. 6) Educate administrators on the risks of command injection and the importance of secure credential management. 7) If patching is delayed, consider temporary compensating controls like disabling remote CLI access or using VPNs with strict access policies for management traffic.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Zyxel
Date Reserved
2025-07-23T09:10:08.765Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f6f0dbb870ea37e2aefe42

Added to database: 10/21/2025, 2:32:59 AM

Last enriched: 2/27/2026, 6:22:22 AM

Last updated: 3/25/2026, 3:04:14 AM

Views: 212

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses