Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Zyxel Resolves Critical Security Flaw in Multiple Devices

Zyxel Resolves Critical Security Flaw in Multiple Devices

Posted on February 26, 2026 By CWS

This week, Zyxel, a prominent networking provider, released crucial patches to address several vulnerabilities found in numerous device models. Among these, a major flaw poses a risk of remote code execution.

Understanding the Critical Vulnerability

The vulnerability, tagged as CVE-2025-13942 with a CVSS score of 9.8, is a command injection issue. This flaw affects the UPnP feature of 18 models, including routers, ONTs, and wireless extenders. According to Zyxel’s advisory, attackers could exploit this flaw through crafted UPnP SOAP requests, allowing them to execute operating system commands on susceptible devices.

Remote Exploitation Conditions

Zyxel emphasizes that the default settings of these devices have WAN access disabled. Therefore, remote exploitation is possible only if both the WAN access and the vulnerable UPnP function are enabled. This highlights the importance of reviewing device settings to mitigate potential risks.

Additional Vulnerabilities and Fixes

Alongside the critical flaw, Zyxel’s updates also address CVE-2025-13943 and CVE-2026-1459, both high-severity command injection vulnerabilities. These affect the log file download function and the TR-369 certificate download CGI program in certain firmware versions. Exploitation could lead to arbitrary OS command execution by authenticated attackers.

Moreover, Zyxel has patched four null pointer dereference vulnerabilities, which could facilitate denial-of-service (DoS) attacks when exploited by users with administrator rights. This could occur through crafted HTTP requests if WAN access and user credentials are compromised.

Response and Recommendations

Zyxel has provided a detailed list of affected devices and confirmed that firmware updates are available. Although no active exploitation of these vulnerabilities has been reported, previous targeting of Zyxel flaws by threat actors underscores the importance of applying these updates promptly.

Related security updates by other companies, such as Cisco and Nvidia, highlight the ongoing challenges in maintaining cybersecurity across network devices.

Security Week News Tags:critical flaw, CVE-2025-13942, CVE-2025-13943, CVE-2026-1459, Cybersecurity, denial of service, firmware update, Networking, null pointer dereference, remote code execution, router security, security patch, UPnP vulnerability, Vulnerability, Zyxel

Post navigation

Previous Post: Microsoft Alerts Developers to Malicious Repos Spreading Malware
Next Post: Critical Telnet Flaw Exposes Root Access Vulnerability

Related Posts

Webinar Today: AI and the Trust Dilemma: Balancing Innovation and Risk Webinar Today: AI and the Trust Dilemma: Balancing Innovation and Risk Security Week News
Ox Security Bags M Series B to Tackle Appsec Alert Fatigue  Ox Security Bags $60M Series B to Tackle Appsec Alert Fatigue  Security Week News
Google Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery Google Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery Security Week News
North Korean Hackers Take Over Victims’ Systems Using Zoom Meeting North Korean Hackers Take Over Victims’ Systems Using Zoom Meeting Security Week News
Fortinet Addresses Critical Security Flaws in Latest Update Fortinet Addresses Critical Security Flaws in Latest Update Security Week News
SAP Zero-Day Targeted Since January, Many Sectors Impacted  SAP Zero-Day Targeted Since January, Many Sectors Impacted  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Act Now: Prepare for Post-Quantum Cryptography
  • Chinese Hackers Exploit ChatGPT for Global Cyber Operations
  • Gambit Security Secures $61M for AI Cyber Resilience
  • Malicious NuGet Package Targets Financial Sector
  • Critical Telnet Flaw Exposes Root Access Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Act Now: Prepare for Post-Quantum Cryptography
  • Chinese Hackers Exploit ChatGPT for Global Cyber Operations
  • Gambit Security Secures $61M for AI Cyber Resilience
  • Malicious NuGet Package Targets Financial Sector
  • Critical Telnet Flaw Exposes Root Access Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News