Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2821 articles · 123542 vulns · 37/41 feeds (7d)
← Back to list
4.9
CVE-2025-11848PATCHED
zyxel · ee5301-00_firmware

A null pointer dereference vulnerability in the Wake-on-LAN CGI program of the Zyxel VMG3625-T50B firmware version through 5.50(ABPM.9.6)C0 and the Zyxel WX3100-T0 firmware versions through 5.50(ABVL.

Description

A null pointer dereference vulnerability in the Wake-on-LAN CGI program of the Zyxel VMG3625-T50B firmware version through 5.50(ABPM.9.6)C0 and the Zyxel WX3100-T0 firmware versions through 5.50(ABVL.4.8)C0 could allow an authenticated attacker with administrator privileges to trigger a denial-of-service (DoS) condition by sending a crafted HTTP request.

Affected Products

VendorProductVersions
zyxelee5301-00_firmware< 5.63\(acld.2.1\)c0, < 5.63\(acmu.2.1\)c0, < 5.17\(abyo.7.1\)c0, < 5.17\(abyl.10.1\)c0, < 5.17\(abyl.10.1\)c0, < 5.50\(abvy.7.1\)c0, < 5.50\(abvy.7.1\)c0, < 5.50\(abvy.7.1\)c0, < 5.19\(acjq.4.1\)c0, < 5.50\(abpm.9.7\)c0, < 5.50\(abpm.9.7\)c0, < 5.50\(acdi.2.3\)c0, < 5.50\(abvy.7.1\)c0, < 5.50\(abvy.7.1\)c0, < 5.50\(abvy.7.1\)c0, < 5.44\(achr.5.1\)c0, < 5.44\(achr.5.1\)c0, < 5.17\(abup.15.2\)c0, < 5.17\(abup.15.2\)c0, < 5.70\(acif.2.1\)c0, < 5.17\(abyo.7.1\)c0, < 5.17\(abqx.11.1\)c0, < 5.70\(aceg.5.3\)c0, < 5.70\(acdz.5.1\)c0, < 5.70\(acdz.5.1\)c0, < 5.18\(achn.3.1\)c0, < 5.18\(acak.1.6\)c0, < 5.18\(accl.2\)c0, < 5.61\(ackk.1.2\)c0, < 5.50\(abpm.9.7\)c0, < 5.17\(abqa.3.2\)c0, < 5.17\(abqa.3.2\)c0, < 5.17\(abpc.7.1\)c0, < 5.63\(acmt.2.1\)c0, < 5.63\(acoj.2.1\)c0, < 5.42\(acbf.4.1\)c0, < 5.42\(acbf.4.1\)c0, < 5.42\(acbf.4.1\)c0, < 5.42\(abyy.4.1\)c0, < 5.44\(achk.3\)c0, < 5.44\(acjb.1.5\)c0, < 5.44\(ackb.0.6\)c0, < 1.30\(acgn.0\)c0, < 5.50\(abpm.9.7\)c0, < 5.70\(acka.1.1\)c0, < 5.50\(abvl.4.9\)c0, < 5.17\(abve.2.10\)c0, < 5.70\(aceb.5.1\)c0, < 5.18\(acgj.0.5\)c0

References

  • https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-null-pointer-dereference-and-command-injection-vulnerabilities-in-certain-4g-lte-5g-nr-cpe-dsl-ethernet-cpe-fiber-onts-security-routers-and-wireless-extenders-02-24-2026(Vendor Advisory)
CVSS 3.14.9 MEDIUM
VectorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CISA KEV❌ No
Actively exploited❌ No
Patch available
5.63\(acld.2.1\)c05.63\(acmu.2.1\)c05.17\(abyo.7.1\)c05.17\(abyl.10.1\)c05.50\(abvy.7.1\)c05.19\(acjq.4.1\)c05.50\(abpm.9.7\)c05.50\(acdi.2.3\)c05.44\(achr.5.1\)c05.17\(abup.15.2\)c05.70\(acif.2.1\)c05.17\(abqx.11.1\)c05.70\(aceg.5.3\)c05.70\(acdz.5.1\)c05.18\(achn.3.1\)c05.18\(acak.1.6\)c05.18\(accl.2\)c05.61\(ackk.1.2\)c05.17\(abqa.3.2\)c05.17\(abpc.7.1\)c05.63\(acmt.2.1\)c05.63\(acoj.2.1\)c05.42\(acbf.4.1\)c05.42\(abyy.4.1\)c05.44\(achk.3\)c05.44\(acjb.1.5\)c05.44\(ackb.0.6\)c01.30\(acgn.0\)c05.70\(acka.1.1\)c05.50\(abvl.4.9\)c05.17\(abve.2.10\)c05.70\(aceb.5.1\)c05.18\(acgj.0.5\)c0
CWECWE-476
PublishedFeb 24, 2026
Last enriched26d ago
Trending Score0
Source articles0
Independent0
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-1460EXP
CVE-2026-1460: A post-authentication command injection vulnerability in the “DomainName” parameter of the DHCP configuration file in Zy
Trending: 49
MEDIUMCVE-2026-0711EXP
CVE-2026-0711: A post-authentication command injection vulnerability in the EasyMesh-related APIs of Zyxel DX3300-T0 firmware versions
Trending: 45
PRE-CVE
Command Injection Vulnerabilities in Zyxel 4G LTE/5G NR CPE, DSL/Ethernet CPE, Fiber ONTs, and Wireless Extenders
Trending: 20
MEDIUMCVE-2026-6058EXP
CVE-2026-6058: ** UNSUPPORTED WHEN ASSIGNED ** An improper encoding or escaping vulnerability in the CGI program of Zyxel WRE6505 v2 fi
Trending: 12
MEDIUMCVE-2025-11847
A null pointer dereference vulnerability in the IP settings CGI program of the Zyxel VMG3625-T50B firmware versions through 5.50(ABPM.9.6)C0 and the Zyxel WX3100-T0 firmware versions through 5.50(ABVL

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Vulnerability Timeline

CVE Published
Feb 24, 2026
Patch Available
Feb 25, 2026
Discovered by ZDM
Apr 1, 2026