Security News Critical Zyxel Vulnerabilities Exposes Routers to Remote Command Injection

Parkinsond

Level 62
Thread author
Verified
Well-known
Dec 6, 2023
5,187
14,807
6,069
Critical firmware updates have been released to address multiple serious vulnerabilities in networking devices, including 4G LTE/5G NR CPEs, DSL/Ethernet CPEs, Fiber ONTs, Security Routers, and Wireless Extenders.

These flaws expose affected routers to remote command injection and denial-of-service (DoS) attacks.

The most severe threat stems from CVE-2025-13942 (CVSS 9.8), which allows remote code execution (RCE) without requiring user authentication.

If a malicious actor sends a specially crafted UPnP request, they can completely compromise the device’s operating system.

An attack can only succeed if a user has manually enabled both WAN access and the vulnerable UPnP function.

Similarly, the DoS vulnerabilities and post-authentication command injection require compromised administrator passwords to be exploited.

 
Technical Analysis & Remediation

MITRE ATT&CK Mapping

T1190

(Exploit Public-Facing Application)

T1568.002
(Dynamic Resolution: Domain Generation Algorithms / DNS Hijacking)

CVE Profile

Zyxel

CVE-2025-13942 [NVD Score: 9.8]
[CISA KEV Status: Inactive/Pending].

D-Link
Historic Vulnerabilities [NVD Score: N/A - Exploit-DB Mapped]
[CISA KEV Status: Active]

Telemetry

Hashes

Origin: Insufficient Evidence.

IPs
8.8.8.8, 1.1.1.1 (Safe Resolvers)

Payload
The D-Link payload structure resembles the DNSChanger malware family, designed to redirect traffic to malicious advertisement servers and phishing infrastructure.

Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)

GOVERN (GV) – Crisis Management & Oversight

Command
Issue a supply chain and remote-worker advisory detailing the hardware revisions affected (e.g., Zyxel Nebula NR7101, DX4510-B0; D-Link DSL-2740R, DSL-2640B).

DETECT (DE) – Monitoring & Analysis

Command
Deploy SIEM queries to hunt for anomalous DNS queries originating from enterprise edge nodes that bypass authorized corporate DNS infrastructure.

RESPOND (RS) – Mitigation & Containment

Command
Isolate affected D-Link models (primarily deployed outside the U.S. via regional carriers) and mandate manual DNS configuration.

RECOVER (RC) – Restoration & Trust

Command
Execute factory resets on compromised devices and validate clean states before reintegrating them into the network routing tables.

IDENTIFY & PROTECT (ID/PR) – The Feedback Loop

Command
Enforce strict edge hardening policies that explicitly disable WAN access, UPnP, and TR-369 certificate download CGIs on all perimeter devices.

Remediation - THE HOME USER TRACK (Safety Focus)

Priority 1: Safety

Command
"Disconnect from the internet immediately."
(Only applicable if you possess a vulnerable D-Link model or have manually enabled WAN/UPnP on a Zyxel device).

Command
"Do not log into banking/email until verified clean."

Priority 2: Identity

Command
Reset administrative router passwords using a known clean device (e.g., phone on 5G), ensuring default credentials are removed.

Priority 3: Persistence

Command
Log into the router's web interface (typically http://192.168.0.1) and manually verify that your DNS servers are set to trusted providers like Google (8.8.8.8) or Cloudflare (1.1.1.1) to break any DNSChanger persistence.

Hardening & References

Baseline

CIS Benchmarks for Network Devices v2.2.

Framework: NIST CSF 2.0 / SP 800-61r3.

Updates
Apply latest vendor firmware. Note that specific Zyxel models (DX5401-B1, EMG3525-T50B) are scheduled for official patches in March 2026.

Source

CyberSecurityNews - D-Link Vulnerability

CyberSecurityNews - Zyxel Vulnerabilities

CISA Known Exploited Vulnerabilities (KEV) Catalog

NIST National Vulnerability Database (NVD)
 
  • Like
Reactions: harlan4096