Zyxel Patches Critical RCE Flaw Affecting 13+ CPE Router Models


Zyxel released firmware addressing CVE-2025-13942 unauthenticated RCE in UPnP function. Affects 4G LTE/5G NR CPE, DSL/Ethernet CPE, Fiber ONTs, wireless extenders. WAN access and UPnP must both enable for remote exploitation. 

Malicious UPnP SOAP requests trigger OS command execution. WAN disabled by default limits attack surface significantly. Shadowserver tracks 120K internet-exposed Zyxel devices currently.

Two high-severity post-auth flaws patched simultaneously (CVE-2025-13943, CVE-2026-1459). Compromised credentials enable command injection. ISP-provided routers represent default gateway risk multiplier.

CISA catalogs 12 exploited Zyxel vulnerabilities in routers, firewalls, NAS. VMG1312, SBG3300, SBG3500 EOL models unpatched despite active exploits. Zyxel recommends replacement over firmware updates.

76K routers uniquely exposed per Shadowserver telemetry. 1M+ businesses deploy Zyxel across 150 markets. Enterprise CPE deployments require immediate patching priority.

Internet-exposed Zyxel devices (Shadowserver)

Affected Product Table

CategoryVulnerable Models
4G/5G CPEMultiple series
DSL CPEVMG3926, VMG4325
Fiber ONTsVarious models
Wireless ExtendersSBG3300, SBG3500

Attack Requirements

  • WAN access enabled (disabled default)
  • UPnP service active
  • Malicious SOAP request delivery
  • No authentication required

Default configurations block remote RCE inherently. ISP replacement cycles lag behind vulnerability disclosure.

Patching Priority

  • Update firmware immediately
  • Disable UPnP where possible
  • Enable WAN access restrictions
  • Replace EOL VMG series routers
  • Monitor Shadowserver exposure
  • Deploy CISA Known Exploited list

Gateway compromise enables full network access. SOHO deployments represent highest risk profile. Zyxel market dominance amplifies breach potential.

FAQ

Primary exploitation vector?

UPnP SOAP command injection.

WAN access requirement?

Must enable (disabled by default).

Total exposed devices tracked?

120K internet-facing Zyxel devices.

Additional flaws patched?

CVE-2025-13943, CVE-2026-1459 post-auth.

CISA tracked Zyxel vulns?

12 exploited vulnerabilities total.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages