CVE-2025-7673

The · The zhttpd web server in Zyxel firmware for multiple products, including the VMG8825-T50K.

A critical vulnerability exists in the web server component of multiple Zyxel networking devices.

Executive summary

A critical vulnerability exists in the web server component of multiple Zyxel networking devices. This flaw allows an unauthenticated remote attacker to execute arbitrary code by sending a specially crafted web request, potentially leading to a complete compromise of the affected device. Due to the high severity and low attack complexity, this vulnerability poses a significant risk to network security and requires immediate attention.

Vulnerability

The vulnerability is a buffer overflow within the URL parsing function of the zhttpd web server. An unauthenticated attacker can send a specially crafted HTTP request containing an overly long URL. This action overwrites the memory buffer allocated for the URL, allowing the attacker to corrupt adjacent memory, which can lead to a denial-of-service (DoS) condition or, more critically, enable remote code execution (RCE) with the privileges of the web server process.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation would allow an attacker to gain complete control over the affected Zyxel device, which often serves as a network gateway. This could lead to severe consequences, including interception and redirection of network traffic, unauthorized access to the internal network, theft of sensitive data, and the use of the compromised device in a botnet for larger-scale attacks. The risk to business continuity, data confidentiality, and network integrity is exceptionally high.

Remediation

Immediate Action: The primary remediation is to apply the security patches provided by the vendor. Administrators should immediately update the firmware on affected Zyxel devices to the latest available version (e.g., version V5.50(ABOM.5)C0 or later for the VMG8825-T50K). After patching, it is crucial to monitor for any signs of post-remediation exploitation attempts and review historical access logs for indicators of compromise.

Proactive Monitoring: Organizations should configure network monitoring tools and security information and event management (SIEM) systems to detect and alert on exploit attempts. Specifically, monitor web server logs for HTTP requests with unusually long or malformed URLs. Network Intrusion Detection/Prevention Systems (IDS/IPS) should be updated with signatures that can identify and block traffic matching the attack pattern for CVE-2025-7673.

Compensating Controls: If immediate patching is not feasible, restrict access to the device's web management interface to a trusted, isolated management network. If remote access is required, ensure it is protected behind a Virtual Private Network (VPN). A properly configured Web Application Firewall (WAF) or an IPS with virtual patching capabilities may also provide a layer of protection by blocking malicious requests before they reach the vulnerable service.

Exploitation status

Public Exploit Available: False

Analyst recommendation

This is a critical, unauthenticated remote code execution vulnerability affecting perimeter network devices. Although it is not currently on the CISA KEV list, its severity and ease of exploitation make it an extremely attractive target for threat actors. We strongly recommend that organizations treat this as an emergency and apply the vendor-supplied firmware updates to all affected Zyxel devices immediately to prevent a potential network compromise.