CVE-2024-40890

HIGH
2025-02-04 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 28, 2026 - 18:24 vuln.today
Added to CISA KEV
Oct 27, 2025 - 17:04 cisa
CISA KEV
CVE Published
Feb 04, 2025 - 10:15 nvd
HIGH 8.8

Description

**UNSUPPORTED WHEN ASSIGNED** A post-authentication command injection vulnerability in the CGI program of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device by sending a crafted HTTP POST request.

Analysis

Zyxel VMG4325-B10A legacy DSL CPE contains post-authentication OS command injection in the CGI program, allowing authenticated attackers to execute OS commands via crafted HTTP POST requests. No patch available (EOL device).

Technical Context

The CWE-78 command injection in the CGI handler passes user input from HTTP POST parameters to shell commands without proper sanitization.

Affected Products

['Zyxel VMG4325-B10A firmware 1.00(AAFR.4)C0_20170615']

Remediation

Replace the EOL device. If impossible, change default credentials, restrict management access to local network only.

Priority Score

140
Low Medium High Critical
KEV: +50
EPSS: +45.9
CVSS: +44
POC: 0

Share

CVE-2024-40890 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy