First published: Tue Feb 04 2025(Updated: )
**UNSUPPORTED WHEN ASSIGNED** A post-authentication command injection vulnerability in the management commands of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device via Telnet.
Credit: security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel VMG4325-B10A |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-40891 is considered high due to its potential for command injection by authenticated attackers.
To fix CVE-2024-40891, it is recommended to upgrade to a newer firmware version that addresses this vulnerability.
CVE-2024-40891 specifically affects the Zyxel VMG4325-B10A device running firmware version 1.00(AAFR.4)C0_20170615.
CVE-2024-40891 is a post-authentication command injection vulnerability.
CVE-2024-40891 requires authentication, so it cannot be exploited remotely without valid access credentials.