Zyxel says it won’t patch security flaws in its old routers

Security
(Image credit: Shutterstock) (Image credit: Shutterstock)

  • Security researchers warn of two Zyxel flaws being abused in the wild
  • The manufacturer confirmed the findings but said the devices are no longer supported
  • Users are advised to migrate to newer models

Zyxel has acknowledged a number of security issues with some of its most popular routers, but says it won't be issuing any patches due to the devices reaching their end-of-life.

Security researchers first discovered two vulnerabilities in a number of Zyxel’s internet-connected devices in summer 2024, and warned earlier this month that the flaws are being exploited in the wild.

In a newly released security advisory, the Taiwanese networking gear manufacturer acknowledged the flaws, and the fact that they’re being abused in the wild, but stressed that the vulnerable devices are past their end-of-life date and thus are no longer supported. Instead, users should migrate to newer, still supported devices.

Wide attack surface

The two vulnerabilities are tracked as CVE-2024-40891 (improper command validation), and CVE-2025-0890 (weak default credentials flaw).

“Zyxel recently became aware of CVE-2024-40890 and CVE-2024-40891 being mentioned in a post on GreyNoise’s blog.

Additionally, VulnCheck informed us that they will publish the technical details regarding CVE-2024-40891 and CVE-2025-0890 on their blog. We have confirmed that the affected models reported by VulnCheck, VMG1312-B10A, VMG1312-B10B, VMG1312-B10E, VMG3312-B10A, VMG3313-B10A, VMG3926-B10B, VMG4325-B10A, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, SBG3300, and SBG3500, are legacy products that have reached end-of-life (EOL) for years.

Therefore, we strongly recommend that users replace them with newer-generation products for optimal protection,” Zyxel said in the advisory.

In its writeup, BleepingComputer says that both FOFA and Censys are showing more than 1,500 Zyxel CPE Series devices exposed to the internet, suggesting that the attack surface is “significant”. At the same time, VulnCheck also shared a proof-of-concept (PoC) against VMG4325-B10A running firmware version 1.00(AAFR.4)C0_20170615, showing that the attack is more than just theoretical.

"While these systems are older and seemingly long out of support, they remain highly relevant due to their continued use worldwide and the sustained interest from attackers," VulnCheck said. "The fact that attackers are still actively exploiting these routers underscores the need for attention, as understanding real-world attacks is critical to effective security research."

You might also like

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Read more
cables going into the back of a broadband router on white background
Netgear urges users to patch major router security issues now
An image of network security icons for a network encircling a digital blue earth.
Industrial networks exposed to attack by faulty Moxa devices
botnet
Another top security camera maker is seeing devices hijacked into botnet
China
Juniper patches security flaws which could have let hackers take over your router
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple routers hit by new critical severity remote command injection vulnerability, with no fix in sight
Abstract image of robots working in an office environment including creating blueprint of robot arm, making a phone call, and typing on a keyboard
This worrying botnet targets unsecure TP-Link routers - thousands of devices already hacked
Latest in Security
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Data leak
A major Keenetic router data leak could put a million households at risk
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple routers hit by new critical severity remote command injection vulnerability, with no fix in sight
Code Skull
This dangerous new ransomware is hitting Windows, ARM, ESXi systems
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users
Latest in News
DeepSeek
Deepseek’s new AI is smarter, faster, cheaper, and a real rival to OpenAI's models
Open AI
OpenAI unveiled image generation for 4o – here's everything you need to know about the ChatGPT upgrade
Apple WWDC 2025 announced
Apple just announced WWDC 2025 starts on June 9, and we'll all be watching the opening event
Hornet swings their weapon in mid air
Hollow Knight: Silksong gets new Steam metadata changes, convincing everyone and their mother that the game is finally releasing this year
OpenAI logo
OpenAI just launched a free ChatGPT bible that will help you master the AI chatbot and Sora
An aerial view of an Instavolt Superhub for charging electric vehicles
Forget gas stations – EV charging Superhubs are using solar power to solve the most annoying thing about electric motoring