Impact
The vulnerability is a post‑authentication command injection flaw located in the EasyMesh‑related APIs of Zyxel DX3300‑T0 devices. An attacker who has already authenticated and possesses administrator privileges on the local network, typically an adjacent device, can exploit the flaw to execute arbitrary operating‑system commands on the affected router. This grants the attacker full control over the device, enabling further compromise or pivoting within the network.
Affected Systems
Affected are Zyxel DX3300‑T0 firmware versions up through 5.50(ABVY.7.1)C0. Devices running any of these firmware releases are vulnerable until patched or replaced.
Risk and Exploitability
The CVSS base score of 6.8 places the vulnerability in the medium severity range, but the requirement of local authentication with administrative rights limits the pool of potential attackers. The EPSS score is not available, so the exact likelihood of exploitation cannot be quantified, and the vulnerability is not currently listed in CISA’s KEV catalog. Nonetheless, an attacker who can compromise a neighboring device or gain legitimate admin access can readily trigger the flaw, making the risk significant for networks that allow such access.
OpenCVE Enrichment