Post-Authentication Command Injection Vulnerability in Zyxel ATP and USG FLEX Series
CVE-2025-8078

7.2HIGH

What is CVE-2025-8078?

CVE-2025-8078 is a post-authentication command injection vulnerability identified in the Zyxel ATP and USG FLEX series network appliances. These devices are designed to offer comprehensive security features such as firewall protection, unified threat management, and network traffic management. This specific vulnerability allows an authenticated attacker with administrator-level privileges to exploit the command interface by injecting crafted commands. The flaw exists in several firmware versions, ranging from V4.32 to V5.40, across multiple product lines including the ATP series, USG FLEX series, and USG20(W)-VPN series. If exploited, the vulnerability could result in unauthorized execution of operating system commands on the affected devices, exposing organizations to significant operational risks.

Potential Impact of CVE-2025-8078

  1. Unauthorized Access and Control: Since the vulnerability allows an authenticated attacker with admin privileges to execute arbitrary commands, it could lead to complete control over the networking device. This level of access could allow further exploits, such as data exfiltration or disruption of network services.

  2. Compromise of Network Security: The ability to execute commands on key security appliances could undermine the integrity of the organization's network defenses. Attackers could manipulate security settings, disable essential services, or implement malicious configurations, creating vulnerabilities that could be exploited for larger-scale attacks.

  3. Facilitation of Further Attacks: Gaining command execution capabilities on a critical network appliance may serve as a foothold for launching additional attacks within the organization's IT infrastructure. This could include lateral movement to more sensitive systems, deploying malware, or facilitating ransomware attacks, thereby amplifying the potential damage to the organization.

Affected Version(s)

ATP series firmware versions from V4.32 through V5.40

USG FLEX 50(W) series firmware versions from V4.16 through V5.40

USG FLEX series firmware version from V4.50 through V5.40

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.