CVE-2025-9133
BaseFortify
Publication date: 2025-10-21
Last updated on: 2025-10-28
Assigner: Zyxel Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| zyxel | zld | From 4.32 (inc) to 5.41 (exc) |
| zyxel | atp100 | * |
| zyxel | atp100w | * |
| zyxel | atp200 | * |
| zyxel | atp500 | * |
| zyxel | atp700 | * |
| zyxel | atp800 | * |
| zyxel | zld | From 4.50 (inc) to 5.41 (exc) |
| zyxel | usg_flex_100 | * |
| zyxel | usg_flex_100ax | * |
| zyxel | usg_flex_100w | * |
| zyxel | usg_flex_200 | * |
| zyxel | usg_flex_50 | * |
| zyxel | usg_flex_500 | * |
| zyxel | usg_flex_50ax | * |
| zyxel | usg_flex_700 | * |
| zyxel | zld | From 4.16 (inc) to 5.41 (exc) |
| zyxel | usg_20w-vpn | * |
| zyxel | usg_flex_50w | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a missing authorization flaw in certain Zyxel device firmware versions. It allows a semi-authenticated attacker, who has only completed the first stage of two-factor authentication, to view and download the system configuration from the affected device without proper authorization.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability could gain access to sensitive system configuration information, potentially leading to further attacks, unauthorized changes, or exposure of confidential network details. This could compromise the security and integrity of the affected device and the network it protects.