First published: Tue Mar 11 2025(Updated: )
A post-authentication command injection vulnerability in the "DNSServer” parameter of the diagnostic function in the Zyxel VMG8825-T50K firmware version V5.50(ABOM.8.5)C0 and earlier could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on a vulnerable device.
Credit: security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel VMG8825-T50K firmware | <=V5.50(ABOM.8.5)C0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11253 is classified as a high severity vulnerability due to its ability to allow authenticated attackers to execute OS commands.
To fix CVE-2024-11253, upgrade the firmware of the Zyxel VMG8825-T50K to the latest version beyond V5.50(ABOM.8.5)C0.
CVE-2024-11253 affects any device running the Zyxel VMG8825-T50K firmware version V5.50(ABOM.8.5)C0 and earlier.
CVE-2024-11253 is a post-authentication command injection vulnerability.
CVE-2024-11253 requires authenticated access, meaning it cannot be exploited remotely by unauthorized users.