Software catalogue for ZyXEL Communications Corp. - page 13

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
[] 
Main › Vulnerability Database › ZyXEL Communications Corp.

Software catalogue for ZyXEL Communications Corp. - page 13

VMG3927-T50K VMG4005-B50A VMG4005-B50B VMG4005-B60A VMG4325-B10A VMG4380-B10A VMG4927-B50A VMG8324-B10A VMG8623-T50B VMG8825-B50A
VMG8825-B50A_B60A VMG8825-B50B VMG8825-B60A VMG8825-B60B VMG8825-Bx0B VMG8825-T50K VMG8924-B10A VMG8924-B10D VMG9827-B50A VPN series


Showing elements 241 - 260 out of 342

  • Previous
  • 13
  • 14
  • More pages
  • 18
  • Next

Latest security bulletins

Secuity bulletin Severity Status Published
SB2026022440: Multiple vulnerabilities in Zyxel products Low
Patched
24.02.2026
SB2026022439: OS Command Injection in Zyxel products Medium
Patched
24.02.2026
SB2026022438: OS Command Injection in Zyxel products High
Patched
24.02.2026
SB2026022437: OS Command Injection in Zyxel products Low
Not patched
24.02.2026
SB2026020583: OS Command Injection in Zyxel Firewalls Low
Patched
05.02.2026
SB2025102144: Multiple vulnerabilities in Zyxel firewalls Medium
Patched
21.10.2025
SB2025071523: Path traversal in Zyxel APs Low
Patched
15.07.2025
SB2025042328: Multiple vulnerabilities in Zyxel USG FLEX H Low
Patched
23.04.2025
SB2025020444: Incorrect default permissions in Zyxel CPE series devices High
Not patched
04.02.2025
SB2025013047: Remote command execution in Zyxel CPE series devices High
Not patched Exploited
30.01.2025

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or