CVE-2025-13942
Zyxel · EX3510-B0
A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 router allows remote attackers to execute arbitrary OS commands via crafted SOAP requests.
Executive summary
A critical remote command injection vulnerability in Zyxel EX3510-B0 routers allows unauthenticated attackers to gain full control of the device by sending malicious UPnP requests.
Vulnerability
This flaw exists in the Universal Plug and Play (UPnP) function. A remote attacker can send specially crafted UPnP SOAP requests that include shell metacharacters, leading to the execution of arbitrary operating system commands with root privileges.
Business impact
Full compromise of a gateway router allows attackers to intercept all network traffic, pivot to internal systems, and launch further attacks. With a CVSS score of 9.8, this vulnerability represents a total loss of confidentiality, integrity, and availability for the affected network infrastructure.
Remediation
Immediate Action: Update the Zyxel EX3510-B0 firmware to the latest patched version provided by the vendor immediately.
Proactive Monitoring: Monitor network traffic for unusual UPnP SOAP requests and check for unauthorized configuration changes on the router.
Compensating Controls: Disable UPnP on the router if it is not strictly necessary for business operations to eliminate the attack vector.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This is a critical vulnerability that should be addressed with the highest priority. Administrators must apply the firmware update immediately and should consider disabling UPnP as a general security best practice to reduce the device's attack surface.