Zyxel says it won’t fix actively exploited flaws in legacy CPE series devices, urges users to upgrade

Zyxel says it won’t fix actively exploited flaws in legacy CPE series devices, urges users to upgrade

Zyxel has issued a security advisory warning that it has no intention to address several actively exploited vulnerabilities in its CPE (Customer Premises Equipment) Series devices reported last month.

According to network scanning engines such as FOFA and Censys, over 1,500 Zyxel CPE Series devices remain exposed to the internet.

The flaws could allow attackers to gain unauthorized access to networks by exploiting two major vulnerabilities. The vulnerabilities affect several end-of-life (EoL) models that Zyxel stopped supporting years ago.

CVE-2024-40891 – The vulnerability stems from improper validation of Telnet commands in the libcms_cli.so library. Authenticated users can exploit this flaw by passing unchecked commands (e.g., ifconfig, ping, tftp) to a shell execution function, which can lead to arbitrary code execution using shell metacharacters. This allows attackers to execute malicious code on the affected devices.

CVE-2025-0890 – A second vulnerability involves the use of weak default credentials (admin:1234, zyuser:1234, supervisor:zyad1234) on the impacted devices. Many users fail to change these default login details, leaving their devices exposed to attack. Notably, the supervisor account has hidden privileges, providing attackers with full system access. Additionally, the zyuser account can be leveraged in conjunction with CVE-2024-40891 to execute remote code.

In addition to the two above flaws, the advisory mentions a third vulnerability tracked as CVE-2024-40890, a post-authentication command injection issue similar to CVE-2024-40891.

Zyxel confirmed that the affected devices, including models such as VMG1312-B10A, VMG3312-B10A, VMG3926-B10B, and SBG3300, are all legacy products that have long since reached their end-of-life (EoL).

“We have confirmed that the affected models reported by VulnCheck, VMG1312-B10A, VMG1312-B10B, VMG1312-B10E, VMG3312-B10A, VMG3313-B10A, VMG3926-B10B, VMG4325-B10A, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, SBG3300, and SBG3500, are legacy products that have reached end-of-life (EOL) for years,” the vendor said. “Therefore, we strongly recommend that users replace them with newer-generation products for optimal protection.”

Separately, the US Cybersecurity and Infrastructure Security Agency (CISA) has added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog: CVE-2024-45195 (Apache OFBiz Forced Browsing Vulnerability), CVE-2024-29059 (Microsoft .NET Framework Information Disclosure Vulnerability), CVE-2018-9276 (Paessler PRTG Network Monitor OS Command Injection Vulnerability), CVE-2018-19410 (Paessler PRTG Network Monitor Local File Inclusion Vulnerability).

Back to the list

Latest Posts

 Cyber Security Week in Review: June 27, 2025

 Cyber Security Week in Review: June 27, 2025

In brief: Citrix patched actively exploited NetScaler vulnerability, malicious actors increasingly target MOVEit Transfer systems, and more.
27 June 2025
Ransomware attack contributed to patient's death at London NHS Trust

Ransomware attack contributed to patient's death at London NHS Trust

The cyberattack disrupted pathology services and led to over 10,000 cancelled appointments across hospitals and GP surgeries in south-east London.
26 June 2025
Citrix patches actively exploited critical flaw in NetScaler ADC

Citrix patches actively exploited critical flaw in NetScaler ADC

Citrix has confirmed that exploitation has been observed on unpatched systems.
26 June 2025