Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-21579 | A buffer overflow vulnerability in the URL parser of the zhttpd web server in Zyxel VMG8825-T50K firmware versions prior to V5.50(ABOM.5)C0 could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and potentially execute arbitrary code by sending a specially crafted HTTP request. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 14 Jan 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zyxel emg3525-t50b
Zyxel emg3525-t50b Firmware Zyxel emg5523-t50b Zyxel emg5523-t50b Firmware Zyxel emg5723-t50k Zyxel emg5723-t50k Firmware Zyxel emg6726-b10a Zyxel emg6726-b10a Firmware Zyxel ex3510-b0 Zyxel ex3510-b0 Firmware Zyxel ex5510-b0 Zyxel ex5510-b0 Firmware Zyxel vmg1312-t20b Zyxel vmg1312-t20b Firmware Zyxel vmg3625-t50b Zyxel vmg3625-t50b Firmware Zyxel vmg3925-b10b Zyxel vmg3925-b10b Firmware Zyxel vmg3925-b10c Zyxel vmg3925-b10c Firmware Zyxel vmg3927-b50a Zyxel vmg3927-b50a Firmware Zyxel vmg3927-b50b Zyxel vmg3927-b50b Firmware Zyxel vmg3927-b60a Zyxel vmg3927-b60a Firmware Zyxel vmg3927-t50k Zyxel vmg3927-t50k Firmware Zyxel vmg4005-b50b Zyxel vmg4005-b50b Firmware Zyxel vmg4927-b50a Zyxel vmg4927-b50a Firmware Zyxel vmg8623-t50b Zyxel vmg8623-t50b Firmware Zyxel vmg8825-b50a Zyxel vmg8825-b50a Firmware Zyxel vmg8825-b60a Zyxel vmg8825-b60a Firmware Zyxel vmg8825-bx0b Zyxel vmg8825-bx0b Firmware Zyxel vmg8825-t50k Zyxel vmg8924-b10d Zyxel vmg8924-b10d Firmware Zyxel xmg3927-b50a Zyxel xmg3927-b50a Firmware Zyxel xmg8825-b50a Zyxel xmg8825-b50a Firmware |
|
| CPEs | cpe:2.3:h:zyxel:emg3525-t50b:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:emg5523-t50b:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:emg5723-t50k:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:emg6726-b10a:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:ex3510-b0:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:ex5510-b0:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vmg1312-t20b:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vmg3625-t50b:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vmg3925-b10b:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vmg3925-b10c:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vmg3927-b50a:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vmg3927-b50b:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vmg3927-b60a:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vmg3927-t50k:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vmg4005-b50b:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vmg4927-b50a:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vmg8623-t50b:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vmg8825-b50a:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vmg8825-b60a:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vmg8825-bx0b:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vmg8825-t50k:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vmg8924-b10d:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:xmg3927-b50a:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:xmg8825-b50a:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:emg3525-t50b_firmware:*:*:*:*:america:*:*:* cpe:2.3:o:zyxel:emg3525-t50b_firmware:*:*:*:*:emea:*:*:* cpe:2.3:o:zyxel:emg5523-t50b_firmware:*:*:*:*:america:*:*:* cpe:2.3:o:zyxel:emg5523-t50b_firmware:*:*:*:*:emea:*:*:* cpe:2.3:o:zyxel:emg5723-t50k_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:emg6726-b10a_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:ex3510-b0_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:ex5510-b0_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vmg1312-t20b_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vmg3625-t50b_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vmg3925-b10b_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vmg3925-b10c_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vmg3927-b50a_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vmg3927-b50b_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vmg3927-b60a_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vmg3927-t50k_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vmg4005-b50b_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vmg4927-b50a_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vmg8623-t50b_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vmg8825-b50a_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vmg8825-b60a_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vmg8825-bx0b_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vmg8825-t50k_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vmg8924-b10d_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:xmg3927-b50a_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:xmg8825-b50a_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Zyxel emg3525-t50b
Zyxel emg3525-t50b Firmware Zyxel emg5523-t50b Zyxel emg5523-t50b Firmware Zyxel emg5723-t50k Zyxel emg5723-t50k Firmware Zyxel emg6726-b10a Zyxel emg6726-b10a Firmware Zyxel ex3510-b0 Zyxel ex3510-b0 Firmware Zyxel ex5510-b0 Zyxel ex5510-b0 Firmware Zyxel vmg1312-t20b Zyxel vmg1312-t20b Firmware Zyxel vmg3625-t50b Zyxel vmg3625-t50b Firmware Zyxel vmg3925-b10b Zyxel vmg3925-b10b Firmware Zyxel vmg3925-b10c Zyxel vmg3925-b10c Firmware Zyxel vmg3927-b50a Zyxel vmg3927-b50a Firmware Zyxel vmg3927-b50b Zyxel vmg3927-b50b Firmware Zyxel vmg3927-b60a Zyxel vmg3927-b60a Firmware Zyxel vmg3927-t50k Zyxel vmg3927-t50k Firmware Zyxel vmg4005-b50b Zyxel vmg4005-b50b Firmware Zyxel vmg4927-b50a Zyxel vmg4927-b50a Firmware Zyxel vmg8623-t50b Zyxel vmg8623-t50b Firmware Zyxel vmg8825-b50a Zyxel vmg8825-b50a Firmware Zyxel vmg8825-b60a Zyxel vmg8825-b60a Firmware Zyxel vmg8825-bx0b Zyxel vmg8825-bx0b Firmware Zyxel vmg8825-t50k Zyxel vmg8924-b10d Zyxel vmg8924-b10d Firmware Zyxel xmg3927-b50a Zyxel xmg3927-b50a Firmware Zyxel xmg8825-b50a Zyxel xmg8825-b50a Firmware |
Wed, 16 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
Wed, 16 Jul 2025 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A buffer overflow vulnerability in the URL parser of the zhttpd web server in Zyxel VMG8825-T50K firmware versions prior to V5.50(ABOM.5)C0 could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and potentially execute arbitrary code by sending a specially crafted HTTP request. | |
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Zyxel
Published:
Updated: 2025-07-19T03:55:18.953Z
Reserved: 2025-07-15T02:01:55.637Z
Link: CVE-2025-7673
Updated: 2025-07-16T14:35:11.324Z
Status : Analyzed
Published: 2025-07-16T07:15:24.437
Modified: 2026-01-14T17:52:29.083
Link: CVE-2025-7673
No data.
OpenCVE Enrichment
Updated: 2025-07-21T15:17:38Z
EUVD