**UNSUPPORTED WHEN ASSIGNED**
A post-authentication command injection vulnerability in the management commands of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device via Telnet.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.4379}

epss

{'score': 0.41265}


Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.50337}

epss

{'score': 0.4379}


Wed, 12 Feb 2025 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Zyxel
Zyxel sbg3300-n000
Zyxel sbg3300-n000 Firmware
Zyxel sbg3300-nb00
Zyxel sbg3300-nb00 Firmware
Zyxel sbg3500-n000 Firmware
Zyxel sbg3500-nb00
Zyxel sbg3500-nb00 Firmware
Zyxel vmg1312-b10a
Zyxel vmg1312-b10a Firmware
Zyxel vmg1312-b10b
Zyxel vmg1312-b10b Firmware
Zyxel vmg1312-b10e
Zyxel vmg1312-b10e Firmware
Zyxel vmg3312-b10a
Zyxel vmg3312-b10a Firmware
Zyxel vmg3313-b10a
Zyxel vmg3313-b10a Firmware
Zyxel vmg3926-b10b
Zyxel vmg3926-b10b Firmware
Zyxel vmg4325-b10a
Zyxel vmg4325-b10a Firmware
Zyxel vmg4380-b10a
Zyxel vmg4380-b10a Firmware
Zyxel vmg8324-b10a
Zyxel vmg8324-b10a Firmware
Zyxel vmg8924-b10a
Zyxel vmg8924-b10a Firmware
CPEs cpe:2.3:h:zyxel:sbg3300-n000:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:sbg3300-nb00:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:sbg3500-nb00:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vmg1312-b10a:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vmg1312-b10b:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vmg1312-b10e:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vmg3312-b10a:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vmg3313-b10a:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vmg3926-b10b:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vmg4325-b10a:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vmg4380-b10a:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vmg8324-b10a:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vmg8924-b10a:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:sbg3300-n000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:sbg3300-nb00_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:sbg3500-n000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:sbg3500-nb00_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vmg1312-b10a_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vmg1312-b10b_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vmg1312-b10e_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vmg3312-b10a_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vmg3313-b10a_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vmg3926-b10b_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vmg4325-b10a_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vmg4380-b10a_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vmg8324-b10a_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vmg8924-b10a_firmware:-:*:*:*:*:*:*:*
Vendors & Products Zyxel
Zyxel sbg3300-n000
Zyxel sbg3300-n000 Firmware
Zyxel sbg3300-nb00
Zyxel sbg3300-nb00 Firmware
Zyxel sbg3500-n000 Firmware
Zyxel sbg3500-nb00
Zyxel sbg3500-nb00 Firmware
Zyxel vmg1312-b10a
Zyxel vmg1312-b10a Firmware
Zyxel vmg1312-b10b
Zyxel vmg1312-b10b Firmware
Zyxel vmg1312-b10e
Zyxel vmg1312-b10e Firmware
Zyxel vmg3312-b10a
Zyxel vmg3312-b10a Firmware
Zyxel vmg3313-b10a
Zyxel vmg3313-b10a Firmware
Zyxel vmg3926-b10b
Zyxel vmg3926-b10b Firmware
Zyxel vmg4325-b10a
Zyxel vmg4325-b10a Firmware
Zyxel vmg4380-b10a
Zyxel vmg4380-b10a Firmware
Zyxel vmg8324-b10a
Zyxel vmg8324-b10a Firmware
Zyxel vmg8924-b10a
Zyxel vmg8924-b10a Firmware

Wed, 12 Feb 2025 00:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2025-02-11'}


Tue, 11 Feb 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 04 Feb 2025 10:15:00 +0000

Type Values Removed Values Added
Description **UNSUPPORTED WHEN ASSIGNED** A post-authentication command injection vulnerability in the management commands of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device via Telnet.
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Zyxel

Published:

Updated: 2025-07-30T01:36:20.370Z

Reserved: 2024-07-11T17:35:29.595Z

Link: CVE-2024-40891

cve-icon Vulnrichment

Updated: 2025-02-11T19:02:56.761Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-04T10:15:08.920

Modified: 2025-02-12T18:11:58.790

Link: CVE-2024-40891

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.