CVE-2024-11253

A post-authentication command injection vulnerability in the "DNSServer” parameter of the diagnostic function in the Zyxel VMG8825-T50K firmware version V5.50(ABOM.8.5)C0 and earlier could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on a vulnerable device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:zyxel:emg5723-t50k_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:emg5723-t50k:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:zyxel:dm4200-b0_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:dm4200-b0:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:zyxel:vmg3927-t50k_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vmg3927-t50k:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:zyxel:vmg4005-b50a_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vmg4005-b50a:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:zyxel:vmg4005-b60a_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vmg4005-b60a:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:zyxel:vmg8825-t50k_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vmg8825-t50k:-:*:*:*:*:*:*:*

History

13 Jan 2026, 16:11

Type Values Removed Values Added
References () https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-command-injection-vulnerabilities-in-certain-dsl-ethernet-cpe-fiber-ont-and-wifi-extender-devices-03-11-2025 - () https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-command-injection-vulnerabilities-in-certain-dsl-ethernet-cpe-fiber-ont-and-wifi-extender-devices-03-11-2025 - Vendor Advisory
CPE cpe:2.3:h:zyxel:vmg8825-t50k:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:emg5723-t50k:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vmg4005-b60a_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:emg5723-t50k_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vmg4005-b50a:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:dm4200-b0:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vmg3927-t50k_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vmg8825-t50k_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:dm4200-b0_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vmg4005-b50a_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vmg3927-t50k:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vmg4005-b60a:-:*:*:*:*:*:*:*
First Time Zyxel emg5723-t50k
Zyxel vmg3927-t50k Firmware
Zyxel emg5723-t50k Firmware
Zyxel dm4200-b0 Firmware
Zyxel vmg8825-t50k Firmware
Zyxel vmg3927-t50k
Zyxel
Zyxel vmg4005-b60a Firmware
Zyxel dm4200-b0
Zyxel vmg8825-t50k
Zyxel vmg4005-b60a
Zyxel vmg4005-b50a
Zyxel vmg4005-b50a Firmware
Summary
  • (es) Una vulnerabilidad de inyección de comandos posterior a la autenticación en el parámetro "DNSServer" de la función de diagnóstico en la versión de firmware V5.50(ABOM.8.5)C0 y anteriores del Zyxel VMG8825-T50K podría permitir que un atacante autenticado con privilegios de administrador ejecute comandos del sistema operativo (OS) en un dispositivo vulnerable.

11 Mar 2025, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-11 02:15

Updated : 2026-01-13 16:11


NVD link : CVE-2024-11253

Mitre link : CVE-2024-11253

CVE.ORG link : CVE-2024-11253


JSON object : View

Products Affected

zyxel

  • vmg4005-b50a_firmware
  • vmg4005-b50a
  • vmg8825-t50k_firmware
  • dm4200-b0_firmware
  • vmg4005-b60a_firmware
  • vmg3927-t50k_firmware
  • vmg8825-t50k
  • vmg4005-b60a
  • emg5723-t50k
  • emg5723-t50k_firmware
  • vmg3927-t50k
  • dm4200-b0
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')