Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration

Posted on October 21, 2025October 21, 2025 By CWS

A important vulnerability in Zyxel’s ATP and USG sequence firewalls that enables attackers to bypass authorization controls and entry delicate system configurations.

Dubbed CVE-2025-9133, this flaw impacts units working firmware variations as much as V5.40(ABPS.0) and allows unauthorized viewing and downloading of configs even through the two-factor authentication (2FA) course of.

Disclosed on August 14, 2025, the difficulty stems from insufficient command filtering within the internet interface, probably exposing credentials, keys, and community settings to distant exploitation.

The vulnerability arises when a consumer with 2FA enabled logs into the system’s internet portal. Usually, they have to enter a one-time PIN through e-mail or an authenticator app to proceed.

Nevertheless, earlier than verification, the system sends semi-authenticated requests to the backend zysh-cgi binary, which handles configuration queries.

In response to Alessandro Sgreccia, who found the flaw parallel to CVE-2025-8078, discovered that attackers can manipulate these requests to inject instructions, evading a whitelist that restricts entry for unverified customers.

Bypassing By way of Command Injection

Utilizing instruments like Burp Suite, the researcher intercepted POST requests to /cgi-bin/zysh-cgi. These requests sometimes embody benign instructions like “present model” or “present customers present,” that are whitelisted for partial authentication states (consumer sort 0x14).

By appending unauthorized instructions with a semicolon equivalent to “present model;present running-config” the injection methods the system.

The binary performs prefix-based validation, checking solely the beginning of the string towards the allowlist. If it matches, your entire command chain is forwarded to the system’s CLI parser, executing the hidden payload with out additional scrutiny.

Makes an attempt to instantly entry configs through export-cgi or file_upload-cgi set off a 302 redirect to the login web page, implementing logout after failed 2FA tries.

However the zysh-cgi endpoint lacks this safety, returning full configuration dumps in JavaScript-serialized responses (e.g., zyshdata arrays) when filter=js2 is ready.

Binary evaluation of zysh-cgi revealed two execution paths primarily based on consumer profile: a restricted “engine” for non-admins that skips full validation, permitting the bypass.

With out splitting instructions on semicolons or re-validating sub-parts, the flaw turns a read-only question right into a full exfiltration vector.

This authorization bypass might allow attackers to reap passwords, API keys, and routing particulars, facilitating lateral motion in networks or persistence through config tampering.

Zyxel units, widespread in enterprise and SMB environments for risk safety, amplify the chance particularly because the flaw persists even with 2FA lively.

Zyxel has not but issued a patch as of October 2025, however specialists suggest speedy mitigations: disable distant internet entry, implement strict firewall guidelines on CGI endpoints, and monitor for anomalous zysh-cgi site visitors.

For remediation, distributors ought to tokenize instructions, validate every sub-command individually, and reject chaining solely. Including CSRF tokens and rate-limiting might bolster defenses.

As cybersecurity threats evolve, this incident underscores the hazards of incomplete enter sanitization in embedded techniques. Organizations utilizing Zyxel ATP/USG ought to audit configurations urgently to stop knowledge leaks.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Authorization, Bypass, Configuration, Download, System, View, Vulnerability, Zyxel

Post navigation

Previous Post: Critical ASP.NET Vulnerability Allows Attacker To Bypass Security Feature Remotely
Next Post: CISA Confirms Exploitation of Latest Oracle EBS Vulnerability 

Related Posts

Anubis Ransomware Attacking Android and Windows Users to Encrypt Files and Steal Login Credentials Cyber Security News
Xerox FreeFlow Core Vulnerability Let Remote Attackers Execute Malicious Code Cyber Security News
Chess.com Data Breach – Hackers Breached External Systems and Gained Internal Access Cyber Security News
5 Must-Follow Rules of Every Elite SOC: CISO’s Checklist Cyber Security News
Next.js Cache Poisoning Vulnerability Let Attackers Trigger DoS Condition Cyber Security News
KillSec Ransomware Attacking Healthcare Industry IT Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Over 73,000 WatchGuard Firebox Devices Impacted by Recent Critical Flaw
  • CISA Confirms Exploitation of Latest Oracle EBS Vulnerability 
  • ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration
  • Critical ASP.NET Vulnerability Allows Attacker To Bypass Security Feature Remotely
  • Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Over 73,000 WatchGuard Firebox Devices Impacted by Recent Critical Flaw
  • CISA Confirms Exploitation of Latest Oracle EBS Vulnerability 
  • ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration
  • Critical ASP.NET Vulnerability Allows Attacker To Bypass Security Feature Remotely
  • Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News