Cyber Posture

CVE-2024-40891

HighCISA KEVActive ExploitationRCE

Published: 04 February 2025

Published
04 February 2025
Modified
27 October 2025
KEV Added
11 February 2025
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.5324 98.0th percentile
Risk Priority 70 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-40891 is a high-severity OS Command Injection (CWE-78) vulnerability in Zyxel Sbg3500-N000 Firmware. Its CVSS base score is 8.8 (High).

Operationally, ranked in the top 2.0% of CVEs by exploit likelihood; CISA has added it to the Known Exploited Vulnerabilities catalog.

The strongest mitigations our analysis identified are NIST 800-53 CM-7 (Least Functionality) and SA-22 (Unsupported System Components).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of information inputs to management commands, directly preventing command injection exploitation in the vulnerable Telnet interface.

prevent

Restricts system functionality to essentials by disabling unnecessary protocols like Telnet and excess management commands, eliminating exposure to the post-authentication injection point.

prevent

Prohibits use of unsupported system components like the legacy vulnerable firmware, directly addressing the unsupported status of the affected Zyxel device.

NVD Description

**UNSUPPORTED WHEN ASSIGNED** A post-authentication command injection vulnerability in the management commands of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device via Telnet.

Deeper analysisAI

CVE-2024-40891 is a post-authentication command injection vulnerability (CWE-78) in the management commands of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615. The flaw, published on 2025-02-04, allows an authenticated attacker to execute arbitrary operating system commands on an affected device via Telnet. The vulnerability was marked as unsupported when assigned, indicating no vendor support at the time of disclosure.

An authenticated attacker with low privileges (PR:L) can exploit this vulnerability remotely over the network (AV:N) with low attack complexity (AC:L) and no user interaction required (UI:N). Exploitation enables high-impact disruption to confidentiality, integrity, and availability (C:H/I:H/A:H), yielding a CVSS v3.1 base score of 8.8. Attackers gain the ability to run OS commands, potentially leading to full device compromise.

Zyxel's security advisory details the command injection vulnerability alongside insecure default credentials issues in certain legacy DSL CPE devices. The advisory is available at https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025.

The vulnerability appears in CISA's Known Exploited Vulnerabilities Catalog (https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-40891), signaling real-world exploitation.

Details

CWE(s)
KEV Date Added
11 February 2025

Affected Products

zyxel
vmg1312-b10a firmware
all versions
zyxel
vmg1312-b10b firmware
all versions
zyxel
vmg1312-b10e firmware
all versions
zyxel
vmg3312-b10a firmware
all versions
zyxel
vmg3313-b10a firmware
all versions
zyxel
vmg3926-b10b firmware
all versions
zyxel
vmg4325-b10a firmware
all versions
zyxel
vmg4380-b10a firmware
all versions
zyxel
vmg8324-b10a firmware
all versions
zyxel
vmg8924-b10a firmware
all versions
+4 more product configuration(s) — see NVD for full list

CVEs Like This One

CVE-2024-40890Same product: Zyxel Sbg3300-N000both on KEV
CVE-2025-0890Same product: Zyxel Sbg3300-N000
CVE-2026-1459Same vendor: Zyxel
CVE-2025-13942Same vendor: Zyxel
CVE-2025-8693Same vendor: Zyxel
CVE-2025-13943Same vendor: Zyxel
CVE-2025-11953Shared CWE-78both on KEV
CVE-2025-64328Shared CWE-78both on KEV
CVE-2026-25108Shared CWE-78both on KEV
CVE-2024-50603Shared CWE-78both on KEV

References