Remote code execution in Zyxel CPE models



| Updated: 2025-07-18
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2025-7673
CWE-ID CWE-119
Exploitation vector Network
Public exploit N/A
Vulnerable software
EMG3525-T50B
Hardware solutions / Routers for home users

EMG5523-T50B
Hardware solutions / Routers for home users

EMG5723-T50K
Hardware solutions / Routers for home users

EMG6726-B10A
Hardware solutions / Routers for home users

EX3510-B0
Hardware solutions / Routers for home users

EX5510-B0
Hardware solutions / Routers for home users

VMG1312-T20B
Hardware solutions / Routers for home users

VMG3625-T50B
Hardware solutions / Routers for home users

VMG3925-B10B/B10C
Hardware solutions / Routers for home users

VMG3927-B50A_B60A
Hardware solutions / Routers for home users

VMG3927-B50B
Hardware solutions / Routers for home users

VMG3927-T50K
Hardware solutions / Routers for home users

VMG4005-B50B
Hardware solutions / Routers for home users

VMG4927-B50A
Hardware solutions / Routers for home users

VMG8623-T50B
Hardware solutions / Routers for home users

VMG8825-B50A_B60A
Hardware solutions / Routers for home users

VMG8825-Bx0B
Hardware solutions / Routers for home users

VMG8825-T50K
Hardware solutions / Routers for home users

VMG8924-B10D
Hardware solutions / Routers for home users

XMG3927-B50A
Hardware solutions / Routers for home users

XMG8825-B50A
Hardware solutions / Routers for home users

Vendor ZyXEL Communications Corp.

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Buffer overflow

EUVDB-ID: #VU113043

Risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2025-7673

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the URL parser of the zhttpd web server. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

EMG3525-T50B: before V5.50(ABSL.0)b8

EMG5523-T50B: before V5.50(ABSL.0)b8

EMG5723-T50K: before V5.50(ABOM.5)C0

EMG6726-B10A: before V5.13 (ABNP.6).C0

EX3510-B0: before V5.17(ABUP.3)C0

EX5510-B0: before V5.15(ABQX.3)C0

VMG1312-T20B: before V5.50(ABSB.3)C0

VMG3625-T50B: before V5.50(ABPM.4)C0

VMG3925-B10B/B10C: before V5.13(AAVF.16)C0

VMG3927-B50A_B60A: before V5.15(ABMT.5)C0

VMG3927-B50B: before 5.13(ABLY.6)C0

VMG3927-T50K: before V5.50(ABOM.5)C0

VMG4005-B50B: before V5.13(ABRL.5)C0

VMG4927-B50A: before V5.13(ABLY.6)C0

VMG8623-T50B: before V5.50(ABPM.4)C0

VMG8825-B50A_B60A: before V5.15(ABMT.5)C0

VMG8825-Bx0B: before 5.17(ABNY.5)C0

VMG8825-T50K: before V5.50(ABOM.5)C0

VMG8924-B10D: before V5.13(ABGQ.6)C0

XMG3927-B50A: before V5.15(ABMT.5)C0

XMG8825-B50A: before V5.15(ABMT.5)C0

CPE2.3 External links

https://www.zyxel.com/service-provider/global/en/zyxel-security-advisory-remote-code-execution-and-denial-service-vulnerabilities-cpe


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###