Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1459: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Zyxel VMG3625-T50B firmware

0
High
VulnerabilityCVE-2026-1459cvecve-2026-1459cwe-78
Published: Tue Feb 24 2026 (02/24/2026, 02:48:35 UTC)
Source: CVE Database V5
Vendor/Project: Zyxel
Product: VMG3625-T50B firmware

Description

A post-authentication command injection vulnerability in the TR-369 certificate download CGI program of the Zyxel VMG3625-T50B firmware versions through 5.50(ABPM.9.7)C0 could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on an affected device.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 20:31:20 UTC

Technical Analysis

CVE-2026-1459 identifies a command injection vulnerability in the Zyxel VMG3625-T50B firmware, versions up to 5.50(ABPM.9.7)C0. The flaw exists in the TR-369 certificate download CGI program, which fails to properly sanitize input before incorporating it into operating system commands. This improper neutralization of special elements (CWE-78) allows an attacker with administrator-level authentication to inject and execute arbitrary OS commands on the device. Because the vulnerability requires administrative privileges, exploitation is limited to users who have already gained elevated access, either legitimately or through prior compromise. The vulnerability has a CVSS 3.1 base score of 7.2, reflecting its high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no user interaction needed. Although no public exploits are known at this time, the potential for severe device compromise exists, including unauthorized configuration changes, data exfiltration, or denial of service. The affected device is commonly used in broadband and enterprise network environments, making it a critical concern for network security. The lack of available patches at the time of disclosure necessitates immediate mitigation through access controls and monitoring.

Potential Impact

The vulnerability allows an authenticated administrator to execute arbitrary OS commands, potentially leading to full device compromise. This can result in unauthorized disclosure of sensitive configuration data, manipulation or disruption of network traffic, and complete denial of service by destabilizing the device. Given the device’s role in network infrastructure, exploitation could facilitate lateral movement within corporate or ISP networks, enabling attackers to pivot to other critical systems. The high CVSS score indicates a significant risk to confidentiality, integrity, and availability. Organizations relying on Zyxel VMG3625-T50B devices may face operational disruptions, data breaches, and increased attack surface if this vulnerability is exploited. The requirement for admin privileges limits exposure but does not eliminate risk, especially in environments with weak credential management or insider threats.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict access controls to limit administrative access to trusted personnel only, preferably via secure management networks or VPNs. Enforce strong, unique administrator passwords and consider multi-factor authentication where possible. Monitor device logs and network traffic for unusual command execution patterns or administrative activity. Disable or restrict the TR-369 certificate download CGI interface if feasible. Conduct regular audits of device firmware versions and plan for prompt updates once Zyxel releases a security patch. Network segmentation can help contain potential compromises. Additionally, consider deploying intrusion detection/prevention systems tuned to detect command injection attempts targeting Zyxel devices. Educate administrators about the risks of credential compromise and the importance of secure management practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Zyxel
Date Reserved
2026-01-27T01:26:24.186Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699d14d6be58cf853b182c26

Added to database: 2/24/2026, 3:02:46 AM

Last enriched: 3/3/2026, 8:31:20 PM

Last updated: 4/9/2026, 5:01:07 AM

Views: 152

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses